{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","type":"ebuild","namespace":"dev-java","name":"oracle-jdk-bin","version":"1.8.0.72","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.8.0.101","latest_non_vulnerable_version":"1.8.0.202","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31303?format=json","vulnerability_id":"VCID-1m2k-jt6j-kyam","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4842.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4842.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4842","reference_id":"","reference_type":"","scores":[{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86776","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77154","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77154"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2827-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2827-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273425","reference_id":"1273425","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273425"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4842","reference_id":"CVE-2015-4842","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4842"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4842"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1m2k-jt6j-kyam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34718?format=json","vulnerability_id":"VCID-2us8-szqx-zbhw","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0469.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0469.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0469","reference_id":"","reference_type":"","scores":[{"value":"0.08615","scoring_system":"epss","scoring_elements":"0.92393","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08615","scoring_system":"epss","scoring_elements":"0.924","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08615","scoring_system":"epss","scoring_elements":"0.92407","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08615","scoring_system":"epss","scoring_elements":"0.92411","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08615","scoring_system":"epss","scoring_elements":"0.92423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08615","scoring_system":"epss","scoring_elements":"0.92427","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08615","scoring_system":"epss","scoring_elements":"0.92433","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08615","scoring_system":"epss","scoring_elements":"0.92436","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1210829","reference_id":"1210829","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1210829"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0806","reference_id":"RHSA-2015:0806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0807","reference_id":"RHSA-2015:0807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0808","reference_id":"RHSA-2015:0808","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0808"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0809","reference_id":"RHSA-2015:0809","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0809"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0858","reference_id":"RHSA-2015:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1006","reference_id":"RHSA-2015:1006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1007","reference_id":"RHSA-2015:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1020","reference_id":"RHSA-2015:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1021","reference_id":"RHSA-2015:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1091","reference_id":"RHSA-2015:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1091"},{"reference_url":"https://usn.ubuntu.com/2573-1/","reference_id":"USN-2573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2573-1/"},{"reference_url":"https://usn.ubuntu.com/2574-1/","reference_id":"USN-2574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2574-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0469"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2us8-szqx-zbhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34714?format=json","vulnerability_id":"VCID-42p6-1tu2-pybt","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0437.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0437.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0437","reference_id":"","reference_type":"","scores":[{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79128","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79146","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.7917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79145","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0437"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183670","reference_id":"1183670","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183670"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0437"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-42p6-1tu2-pybt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34737?format=json","vulnerability_id":"VCID-4y32-1vfu-mqb7","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2659.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2659.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2659","reference_id":"","reference_type":"","scores":[{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78062","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78071","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.781","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78082","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78108","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78113","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78139","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78121","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01108","scoring_system":"epss","scoring_elements":"0.78117","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242144","reference_id":"1242144","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242144"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2659"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4y32-1vfu-mqb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34761?format=json","vulnerability_id":"VCID-52ha-4s4q-3fas","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7840","reference_id":"","reference_type":"","scores":[{"value":"0.19521","scoring_system":"epss","scoring_elements":"0.95367","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19521","scoring_system":"epss","scoring_elements":"0.95376","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19521","scoring_system":"epss","scoring_elements":"0.95382","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19521","scoring_system":"epss","scoring_elements":"0.95387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19521","scoring_system":"epss","scoring_elements":"0.95393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19521","scoring_system":"epss","scoring_elements":"0.95396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19521","scoring_system":"epss","scoring_elements":"0.95401","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19521","scoring_system":"epss","scoring_elements":"0.95403","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7840"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-7840"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52ha-4s4q-3fas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31287?format=json","vulnerability_id":"VCID-5396-g8m1-y3cq","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4731.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4731.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4731","reference_id":"","reference_type":"","scores":[{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91724","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91732","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91768","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.9177","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91766","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242234","reference_id":"1242234","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242234"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4731"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5396-g8m1-y3cq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31300?format=json","vulnerability_id":"VCID-5u17-kgsw-akar","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4806.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4806","reference_id":"","reference_type":"","scores":[{"value":"0.02806","scoring_system":"epss","scoring_elements":"0.86059","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02806","scoring_system":"epss","scoring_elements":"0.8607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02806","scoring_system":"epss","scoring_elements":"0.86086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02806","scoring_system":"epss","scoring_elements":"0.86085","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02806","scoring_system":"epss","scoring_elements":"0.86105","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02806","scoring_system":"epss","scoring_elements":"0.86115","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02806","scoring_system":"epss","scoring_elements":"0.86129","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02806","scoring_system":"epss","scoring_elements":"0.86128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02806","scoring_system":"epss","scoring_elements":"0.86124","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1233687","reference_id":"1233687","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1233687"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2518","reference_id":"RHSA-2015:2518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4806"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5u17-kgsw-akar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34757?format=json","vulnerability_id":"VCID-6and-3vws-p3hu","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4906.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4906.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4906","reference_id":"","reference_type":"","scores":[{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56853","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56948","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56969","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.57007","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56986","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4906"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4906","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4906"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.securityfocus.com/bid/77214","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77214"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273861","reference_id":"1273861","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273861"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823622","reference_id":"823622","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823622"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:javafx:2.2.85:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:javafx:2.2.85:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:javafx:2.2.85:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4906","reference_id":"CVE-2015-4906","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4906"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4906"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6and-3vws-p3hu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31299?format=json","vulnerability_id":"VCID-6y1r-9shn-abdp","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4805.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4805","reference_id":"","reference_type":"","scores":[{"value":"0.06534","scoring_system":"epss","scoring_elements":"0.91073","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06534","scoring_system":"epss","scoring_elements":"0.91079","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06534","scoring_system":"epss","scoring_elements":"0.91087","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06534","scoring_system":"epss","scoring_elements":"0.91096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06534","scoring_system":"epss","scoring_elements":"0.91109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06534","scoring_system":"epss","scoring_elements":"0.91114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06534","scoring_system":"epss","scoring_elements":"0.91122","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06534","scoring_system":"epss","scoring_elements":"0.91123","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273311","reference_id":"1273311","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273311"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2518","reference_id":"RHSA-2015:2518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4805"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6y1r-9shn-abdp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31292?format=json","vulnerability_id":"VCID-7y2q-c6xs-nbex","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4734.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4734.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4734","reference_id":"","reference_type":"","scores":[{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86771","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273430","reference_id":"1273430","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273430"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4734"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7y2q-c6xs-nbex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34725?format=json","vulnerability_id":"VCID-7zbp-hqrr-zfh8","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0484.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0484","reference_id":"","reference_type":"","scores":[{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79295","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79302","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79325","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79311","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79337","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.7937","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79355","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01252","scoring_system":"epss","scoring_elements":"0.79344","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0484"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211773","reference_id":"1211773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211773"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0484"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7zbp-hqrr-zfh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31290?format=json","vulnerability_id":"VCID-82f8-r9qy-a3a9","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4733.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4733.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4733","reference_id":"","reference_type":"","scores":[{"value":"0.09071","scoring_system":"epss","scoring_elements":"0.92615","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09071","scoring_system":"epss","scoring_elements":"0.92622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09071","scoring_system":"epss","scoring_elements":"0.92628","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09071","scoring_system":"epss","scoring_elements":"0.92639","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09071","scoring_system":"epss","scoring_elements":"0.92645","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09071","scoring_system":"epss","scoring_elements":"0.92649","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242275","reference_id":"1242275","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242275"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4733"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-82f8-r9qy-a3a9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31281?format=json","vulnerability_id":"VCID-85a2-7xgd-sydv","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2601.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2601","reference_id":"","reference_type":"","scores":[{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86771","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242019","reference_id":"1242019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242019"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2601"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-85a2-7xgd-sydv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34733?format=json","vulnerability_id":"VCID-8b8r-rdb7-7bed","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2627.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2627.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2627","reference_id":"","reference_type":"","scores":[{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82533","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82562","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82585","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82593","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82605","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01759","scoring_system":"epss","scoring_elements":"0.82598","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2627"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243291","reference_id":"1243291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243291"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2627"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8b8r-rdb7-7bed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34755?format=json","vulnerability_id":"VCID-9gpf-rkqa-2fb4","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4902.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4902.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4902","reference_id":"","reference_type":"","scores":[{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91906","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.9191","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91866","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07681","scoring_system":"epss","scoring_elements":"0.91874","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4902"},{"reference_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-4902","reference_id":"","reference_type":"","scores":[],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-4902"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.securityfocus.com/bid/77241","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://www.securityfocus.com/bid/77241"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273860","reference_id":"1273860","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273860"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus_compute_node:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.0_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.0_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:6.7_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.2_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.3_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.4_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:7.5_s390x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.7_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.2_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.3_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.4_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:7.5_ppc64le:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4902","reference_id":"CVE-2015-4902","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4902"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2518","reference_id":"RHSA-2015:2518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:P/P:M/B:A/M:M/D:A/2025-02-10T19:39:16Z/"}],"url":"https://access.redhat.com/errata/RHSA-2016:1430"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4902"],"risk_score":9.6,"exploitability":"2.0","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9gpf-rkqa-2fb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31285?format=json","vulnerability_id":"VCID-9wuu-5sx8-kqas","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2628.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2628","reference_id":"","reference_type":"","scores":[{"value":"0.08103","scoring_system":"epss","scoring_elements":"0.92122","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08103","scoring_system":"epss","scoring_elements":"0.9213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08103","scoring_system":"epss","scoring_elements":"0.92136","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08103","scoring_system":"epss","scoring_elements":"0.92141","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08103","scoring_system":"epss","scoring_elements":"0.92152","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08103","scoring_system":"epss","scoring_elements":"0.92155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08103","scoring_system":"epss","scoring_elements":"0.9216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08103","scoring_system":"epss","scoring_elements":"0.92156","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242232","reference_id":"1242232","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242232"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2628"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9wuu-5sx8-kqas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31312?format=json","vulnerability_id":"VCID-a326-kbt5-h7bp","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4882.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4882.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4882","reference_id":"","reference_type":"","scores":[{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91107","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91112","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91121","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91147","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91154","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77181","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77181"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2827-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2827-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273414","reference_id":"1273414","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273414"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4882","reference_id":"CVE-2015-4882","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4882"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4882"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a326-kbt5-h7bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31296?format=json","vulnerability_id":"VCID-ajy9-yfsa-5bc5","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4760.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4760.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4760","reference_id":"","reference_type":"","scores":[{"value":"0.09071","scoring_system":"epss","scoring_elements":"0.92615","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09071","scoring_system":"epss","scoring_elements":"0.92622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09071","scoring_system":"epss","scoring_elements":"0.92628","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09071","scoring_system":"epss","scoring_elements":"0.92639","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09071","scoring_system":"epss","scoring_elements":"0.92645","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09071","scoring_system":"epss","scoring_elements":"0.92649","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8147","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8147"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242447","reference_id":"1242447","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242447"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"},{"reference_url":"https://usn.ubuntu.com/2740-1/","reference_id":"USN-2740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2740-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4760"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ajy9-yfsa-5bc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31301?format=json","vulnerability_id":"VCID-au4s-5j9w-nybx","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4835.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4835.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4835","reference_id":"","reference_type":"","scores":[{"value":"0.04878","scoring_system":"epss","scoring_elements":"0.89575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04878","scoring_system":"epss","scoring_elements":"0.8953","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04878","scoring_system":"epss","scoring_elements":"0.89533","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04878","scoring_system":"epss","scoring_elements":"0.89547","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04878","scoring_system":"epss","scoring_elements":"0.89548","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04878","scoring_system":"epss","scoring_elements":"0.89565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04878","scoring_system":"epss","scoring_elements":"0.89569","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04878","scoring_system":"epss","scoring_elements":"0.89577","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77148","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77148"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2827-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2827-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273022","reference_id":"1273022","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273022"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4835","reference_id":"CVE-2015-4835","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4835"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4835"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-au4s-5j9w-nybx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34730?format=json","vulnerability_id":"VCID-azcs-6ud7-nfab","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0492.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0492","reference_id":"","reference_type":"","scores":[{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83735","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83763","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83765","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83811","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83805","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02032","scoring_system":"epss","scoring_elements":"0.83801","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0492"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211770","reference_id":"1211770","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211770"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0492"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-azcs-6ud7-nfab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34741?format=json","vulnerability_id":"VCID-b4ha-df1e-kkah","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4736.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4736.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4736","reference_id":"","reference_type":"","scores":[{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90231","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90234","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90247","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90251","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90281","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05553","scoring_system":"epss","scoring_elements":"0.90276","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4736"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243284","reference_id":"1243284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243284"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4736"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4ha-df1e-kkah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31313?format=json","vulnerability_id":"VCID-b9wa-u375-xuef","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4883.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4883.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4883","reference_id":"","reference_type":"","scores":[{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92193","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92161","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92168","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92177","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92188","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92192","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92197","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77161","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77161"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2827-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2827-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273304","reference_id":"1273304","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273304"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4883","reference_id":"CVE-2015-4883","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4883"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2518","reference_id":"RHSA-2015:2518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4883"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b9wa-u375-xuef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34723?format=json","vulnerability_id":"VCID-bbfs-fg29-vkhx","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0480.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0480.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0480","reference_id":"","reference_type":"","scores":[{"value":"0.07494","scoring_system":"epss","scoring_elements":"0.91751","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07494","scoring_system":"epss","scoring_elements":"0.91759","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07494","scoring_system":"epss","scoring_elements":"0.91765","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07494","scoring_system":"epss","scoring_elements":"0.91772","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07494","scoring_system":"epss","scoring_elements":"0.91785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07494","scoring_system":"epss","scoring_elements":"0.91792","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07494","scoring_system":"epss","scoring_elements":"0.91795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07494","scoring_system":"epss","scoring_elements":"0.91796","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211504","reference_id":"1211504","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211504"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0806","reference_id":"RHSA-2015:0806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0807","reference_id":"RHSA-2015:0807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0808","reference_id":"RHSA-2015:0808","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0808"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0809","reference_id":"RHSA-2015:0809","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0809"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0858","reference_id":"RHSA-2015:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1006","reference_id":"RHSA-2015:1006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1007","reference_id":"RHSA-2015:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1020","reference_id":"RHSA-2015:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1021","reference_id":"RHSA-2015:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1091","reference_id":"RHSA-2015:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1091"},{"reference_url":"https://usn.ubuntu.com/2573-1/","reference_id":"USN-2573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2573-1/"},{"reference_url":"https://usn.ubuntu.com/2574-1/","reference_id":"USN-2574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2574-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0480"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bbfs-fg29-vkhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34734?format=json","vulnerability_id":"VCID-cwm9-b8a3-skdz","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2637.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2637","reference_id":"","reference_type":"","scores":[{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86071","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86097","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86115","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86127","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86141","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.8614","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02811","scoring_system":"epss","scoring_elements":"0.86136","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243287","reference_id":"1243287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243287"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2637"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cwm9-b8a3-skdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34754?format=json","vulnerability_id":"VCID-d9gp-4hm3-h7dc","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4901.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4901.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4901","reference_id":"","reference_type":"","scores":[{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.7542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75365","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75401","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.7538","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75433","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75453","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75431","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4901"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4901","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4901"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.securityfocus.com/bid/77226","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77226"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273856","reference_id":"1273856","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273856"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823622","reference_id":"823622","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823622"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4901","reference_id":"CVE-2015-4901","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4901"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4901"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d9gp-4hm3-h7dc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34738?format=json","vulnerability_id":"VCID-dkzr-ncga-w3ex","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2664.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2664","reference_id":"","reference_type":"","scores":[{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36901","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36815","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36805","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3678","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2664"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243300","reference_id":"1243300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243300"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2664"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dkzr-ncga-w3ex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31311?format=json","vulnerability_id":"VCID-ds2p-83xe-dfdm","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4881.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4881.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4881","reference_id":"","reference_type":"","scores":[{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91766","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91724","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91732","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.91768","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07452","scoring_system":"epss","scoring_elements":"0.9177","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77159","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77159"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2827-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2827-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273027","reference_id":"1273027","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273027"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4881","reference_id":"CVE-2015-4881","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4881"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4881"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2p-83xe-dfdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31310?format=json","vulnerability_id":"VCID-e4dr-2bah-k7bp","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4872.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4872","reference_id":"","reference_type":"","scores":[{"value":"0.0356","scoring_system":"epss","scoring_elements":"0.87705","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0356","scoring_system":"epss","scoring_elements":"0.87651","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0356","scoring_system":"epss","scoring_elements":"0.87661","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0356","scoring_system":"epss","scoring_elements":"0.87674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0356","scoring_system":"epss","scoring_elements":"0.87675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0356","scoring_system":"epss","scoring_elements":"0.87696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0356","scoring_system":"epss","scoring_elements":"0.87702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0356","scoring_system":"epss","scoring_elements":"0.87714","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0356","scoring_system":"epss","scoring_elements":"0.87707","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10141","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10141"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77211","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77211"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2827-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2827-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273734","reference_id":"1273734","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273734"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4872","reference_id":"CVE-2015-4872","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4872"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2518","reference_id":"RHSA-2015:2518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4872"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e4dr-2bah-k7bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34751?format=json","vulnerability_id":"VCID-edcu-48sn-ufbj","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4868.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4868","reference_id":"","reference_type":"","scores":[{"value":"0.03897","scoring_system":"epss","scoring_elements":"0.88275","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03897","scoring_system":"epss","scoring_elements":"0.88219","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03897","scoring_system":"epss","scoring_elements":"0.88227","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03897","scoring_system":"epss","scoring_elements":"0.88242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03897","scoring_system":"epss","scoring_elements":"0.88247","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03897","scoring_system":"epss","scoring_elements":"0.88266","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03897","scoring_system":"epss","scoring_elements":"0.88272","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03897","scoring_system":"epss","scoring_elements":"0.88284","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03897","scoring_system":"epss","scoring_elements":"0.88276","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4868"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10141","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10141"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77225","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77225"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273328","reference_id":"1273328","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273328"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4868","reference_id":"CVE-2015-4868","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4868"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4868"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-edcu-48sn-ufbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34728?format=json","vulnerability_id":"VCID-ey6a-ffm9-4yhs","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0488.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0488.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0488","reference_id":"","reference_type":"","scores":[{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92433","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92448","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.9245","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92462","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92467","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92473","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08679","scoring_system":"epss","scoring_elements":"0.92475","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211543","reference_id":"1211543","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211543"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0806","reference_id":"RHSA-2015:0806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0807","reference_id":"RHSA-2015:0807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0808","reference_id":"RHSA-2015:0808","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0808"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0809","reference_id":"RHSA-2015:0809","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0809"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0858","reference_id":"RHSA-2015:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1006","reference_id":"RHSA-2015:1006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1007","reference_id":"RHSA-2015:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1020","reference_id":"RHSA-2015:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1021","reference_id":"RHSA-2015:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1091","reference_id":"RHSA-2015:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1091"},{"reference_url":"https://usn.ubuntu.com/2573-1/","reference_id":"USN-2573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2573-1/"},{"reference_url":"https://usn.ubuntu.com/2574-1/","reference_id":"USN-2574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2574-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0488"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ey6a-ffm9-4yhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34720?format=json","vulnerability_id":"VCID-f72j-41w3-1be1","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0477.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0477.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0477","reference_id":"","reference_type":"","scores":[{"value":"0.03763","scoring_system":"epss","scoring_elements":"0.87983","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03763","scoring_system":"epss","scoring_elements":"0.87993","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03763","scoring_system":"epss","scoring_elements":"0.88007","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03763","scoring_system":"epss","scoring_elements":"0.88011","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03763","scoring_system":"epss","scoring_elements":"0.88032","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03763","scoring_system":"epss","scoring_elements":"0.88038","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03763","scoring_system":"epss","scoring_elements":"0.88048","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03763","scoring_system":"epss","scoring_elements":"0.8804","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03763","scoring_system":"epss","scoring_elements":"0.88041","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211299","reference_id":"1211299","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211299"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0806","reference_id":"RHSA-2015:0806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0807","reference_id":"RHSA-2015:0807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0808","reference_id":"RHSA-2015:0808","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0808"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0809","reference_id":"RHSA-2015:0809","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0809"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0858","reference_id":"RHSA-2015:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1006","reference_id":"RHSA-2015:1006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1007","reference_id":"RHSA-2015:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1020","reference_id":"RHSA-2015:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1021","reference_id":"RHSA-2015:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1091","reference_id":"RHSA-2015:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1091"},{"reference_url":"https://usn.ubuntu.com/2573-1/","reference_id":"USN-2573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2573-1/"},{"reference_url":"https://usn.ubuntu.com/2574-1/","reference_id":"USN-2574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2574-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0477"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f72j-41w3-1be1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34735?format=json","vulnerability_id":"VCID-fhch-983g-ryf2","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2638.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2638","reference_id":"","reference_type":"","scores":[{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91272","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91287","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91293","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91312","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91319","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.91321","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06794","scoring_system":"epss","scoring_elements":"0.9132","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2638"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243283","reference_id":"1243283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243283"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2638"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fhch-983g-ryf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31309?format=json","vulnerability_id":"VCID-j35a-btuq-83hs","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0053.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0053.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0054.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0054.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4871.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4871","reference_id":"","reference_type":"","scores":[{"value":"0.02398","scoring_system":"epss","scoring_elements":"0.85048","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02398","scoring_system":"epss","scoring_elements":"0.84972","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02398","scoring_system":"epss","scoring_elements":"0.84986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02398","scoring_system":"epss","scoring_elements":"0.85004","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02398","scoring_system":"epss","scoring_elements":"0.85008","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02398","scoring_system":"epss","scoring_elements":"0.8503","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02398","scoring_system":"epss","scoring_elements":"0.85037","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02398","scoring_system":"epss","scoring_elements":"0.85054","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02398","scoring_system":"epss","scoring_elements":"0.85052","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.debian.org/security/2015/dsa-3401","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3401"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securityfocus.com/bid/77238","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77238"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2818-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2818-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273859","reference_id":"1273859","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273859"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4871","reference_id":"CVE-2015-4871","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4871"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0053","reference_id":"RHSA-2016:0053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0054","reference_id":"RHSA-2016:0054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2818-1/","reference_id":"USN-2818-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2818-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4871"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j35a-btuq-83hs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34726?format=json","vulnerability_id":"VCID-j4nj-26mu-p7a2","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0486.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0486.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0486","reference_id":"","reference_type":"","scores":[{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56853","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56948","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56969","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.57007","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56986","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56963","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0486"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211774","reference_id":"1211774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211774"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0486"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j4nj-26mu-p7a2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34742?format=json","vulnerability_id":"VCID-j8w9-x9f9-hfec","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4810.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4810.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4810","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24083","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24034","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24102","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24165","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24123","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24067","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4810"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273858","reference_id":"1273858","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273858"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4810"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j8w9-x9f9-hfec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31282?format=json","vulnerability_id":"VCID-jwjm-hptr-a3hy","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2613.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2613.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2613","reference_id":"","reference_type":"","scores":[{"value":"0.02671","scoring_system":"epss","scoring_elements":"0.85739","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02671","scoring_system":"epss","scoring_elements":"0.85752","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02671","scoring_system":"epss","scoring_elements":"0.8577","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02671","scoring_system":"epss","scoring_elements":"0.85776","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02671","scoring_system":"epss","scoring_elements":"0.85795","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02671","scoring_system":"epss","scoring_elements":"0.85806","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02671","scoring_system":"epss","scoring_elements":"0.8582","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02671","scoring_system":"epss","scoring_elements":"0.85817","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02671","scoring_system":"epss","scoring_elements":"0.85813","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242456","reference_id":"1242456","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242456"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2613"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jwjm-hptr-a3hy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31315?format=json","vulnerability_id":"VCID-kahp-6ybn-9yax","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4893.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4893.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4893","reference_id":"","reference_type":"","scores":[{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91107","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91112","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91121","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91147","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91154","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10141","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10141"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77207","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77207"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2827-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2827-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273638","reference_id":"1273638","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273638"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4893","reference_id":"CVE-2015-4893","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4893"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4893"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kahp-6ybn-9yax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31316?format=json","vulnerability_id":"VCID-knv6-1uv9-yfcy","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4903.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4903.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4903","reference_id":"","reference_type":"","scores":[{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86776","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77194","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77194"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2827-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2827-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273496","reference_id":"1273496","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273496"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4903","reference_id":"CVE-2015-4903","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4903"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2518","reference_id":"RHSA-2015:2518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4903"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-knv6-1uv9-yfcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34719?format=json","vulnerability_id":"VCID-kucz-azme-d7a5","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0470.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0470.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0470","reference_id":"","reference_type":"","scores":[{"value":"0.01655","scoring_system":"epss","scoring_elements":"0.8197","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01655","scoring_system":"epss","scoring_elements":"0.81981","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01655","scoring_system":"epss","scoring_elements":"0.82004","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01655","scoring_system":"epss","scoring_elements":"0.82","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01655","scoring_system":"epss","scoring_elements":"0.82027","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01655","scoring_system":"epss","scoring_elements":"0.82034","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01655","scoring_system":"epss","scoring_elements":"0.82054","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01655","scoring_system":"epss","scoring_elements":"0.82043","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01655","scoring_system":"epss","scoring_elements":"0.82036","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211387","reference_id":"1211387","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211387"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0809","reference_id":"RHSA-2015:0809","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0809"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0470"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kucz-azme-d7a5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31307?format=json","vulnerability_id":"VCID-nv52-jzcr-37ay","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4860.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4860.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4860","reference_id":"","reference_type":"","scores":[{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92193","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92161","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92168","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92177","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92188","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92192","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0818","scoring_system":"epss","scoring_elements":"0.92197","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77162","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77162"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2827-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2827-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273308","reference_id":"1273308","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273308"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4860","reference_id":"CVE-2015-4860","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4860"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2518","reference_id":"RHSA-2015:2518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4860"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nv52-jzcr-37ay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31284?format=json","vulnerability_id":"VCID-ppc6-sk8a-ebf6","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2625.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2625","reference_id":"","reference_type":"","scores":[{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86771","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1241965","reference_id":"1241965","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1241965"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2625"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ppc6-sk8a-ebf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34717?format=json","vulnerability_id":"VCID-pwe3-cgry-z7ax","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0460.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0460.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0460","reference_id":"","reference_type":"","scores":[{"value":"0.05278","scoring_system":"epss","scoring_elements":"0.8996","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05278","scoring_system":"epss","scoring_elements":"0.89963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05278","scoring_system":"epss","scoring_elements":"0.89975","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05278","scoring_system":"epss","scoring_elements":"0.89981","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05278","scoring_system":"epss","scoring_elements":"0.89997","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05278","scoring_system":"epss","scoring_elements":"0.90002","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05278","scoring_system":"epss","scoring_elements":"0.9001","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05278","scoring_system":"epss","scoring_elements":"0.90009","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211285","reference_id":"1211285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211285"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0806","reference_id":"RHSA-2015:0806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0807","reference_id":"RHSA-2015:0807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0808","reference_id":"RHSA-2015:0808","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0808"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0809","reference_id":"RHSA-2015:0809","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0809"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0858","reference_id":"RHSA-2015:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0858"},{"reference_url":"https://usn.ubuntu.com/2573-1/","reference_id":"USN-2573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2573-1/"},{"reference_url":"https://usn.ubuntu.com/2574-1/","reference_id":"USN-2574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2574-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0460"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pwe3-cgry-z7ax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34721?format=json","vulnerability_id":"VCID-q7vq-c2wa-33d8","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0478.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0478","reference_id":"","reference_type":"","scores":[{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88581","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.8859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88607","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88609","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88627","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88644","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88636","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04125","scoring_system":"epss","scoring_elements":"0.88637","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1210355","reference_id":"1210355","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1210355"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0806","reference_id":"RHSA-2015:0806","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0806"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0807","reference_id":"RHSA-2015:0807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0808","reference_id":"RHSA-2015:0808","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0808"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0809","reference_id":"RHSA-2015:0809","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0809"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0858","reference_id":"RHSA-2015:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1006","reference_id":"RHSA-2015:1006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1007","reference_id":"RHSA-2015:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1020","reference_id":"RHSA-2015:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1021","reference_id":"RHSA-2015:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1091","reference_id":"RHSA-2015:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1091"},{"reference_url":"https://usn.ubuntu.com/2573-1/","reference_id":"USN-2573-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2573-1/"},{"reference_url":"https://usn.ubuntu.com/2574-1/","reference_id":"USN-2574-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2574-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0478"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q7vq-c2wa-33d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31305?format=json","vulnerability_id":"VCID-qb56-zfz8-4bev","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4844.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4844.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4844","reference_id":"","reference_type":"","scores":[{"value":"0.10364","scoring_system":"epss","scoring_elements":"0.93202","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10364","scoring_system":"epss","scoring_elements":"0.93173","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10364","scoring_system":"epss","scoring_elements":"0.93183","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10364","scoring_system":"epss","scoring_elements":"0.93187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10364","scoring_system":"epss","scoring_elements":"0.93185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10364","scoring_system":"epss","scoring_elements":"0.93194","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10364","scoring_system":"epss","scoring_elements":"0.93198","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10364","scoring_system":"epss","scoring_elements":"0.93203","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10364","scoring_system":"epss","scoring_elements":"0.932","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77164","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77164"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2827-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2827-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273318","reference_id":"1273318","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273318"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4844","reference_id":"CVE-2015-4844","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4844"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2518","reference_id":"RHSA-2015:2518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"},{"reference_url":"https://usn.ubuntu.com/3227-1/","reference_id":"USN-3227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3227-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4844"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qb56-zfz8-4bev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31302?format=json","vulnerability_id":"VCID-r691-77bt-skhe","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4840.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4840.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4840","reference_id":"","reference_type":"","scores":[{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86776","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77242","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77242"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273338","reference_id":"1273338","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273338"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4840","reference_id":"CVE-2015-4840","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4840"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4840"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r691-77bt-skhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31283?format=json","vulnerability_id":"VCID-rxz6-u57e-jqdf","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2621.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2621.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2621","reference_id":"","reference_type":"","scores":[{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86709","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86756","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0308","scoring_system":"epss","scoring_elements":"0.86771","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242372","reference_id":"1242372","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242372"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2621"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rxz6-u57e-jqdf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34729?format=json","vulnerability_id":"VCID-rzqe-8qgr-7fet","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0491.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0491.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0491","reference_id":"","reference_type":"","scores":[{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.91963","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.91972","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.91979","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.91985","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.91998","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92001","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92005","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07853","scoring_system":"epss","scoring_elements":"0.92004","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0491"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211769","reference_id":"1211769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211769"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0858","reference_id":"RHSA-2015:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1006","reference_id":"RHSA-2015:1006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1007","reference_id":"RHSA-2015:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1020","reference_id":"RHSA-2015:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1021","reference_id":"RHSA-2015:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1091","reference_id":"RHSA-2015:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1091"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0491"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqe-8qgr-7fet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34739?format=json","vulnerability_id":"VCID-rzqy-gheq-cqgg","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4000","reference_id":"","reference_type":"","scores":[{"value":"0.93743","scoring_system":"epss","scoring_elements":"0.99851","published_at":"2026-04-07T12:55:00Z"},{"value":"0.93894","scoring_system":"epss","scoring_elements":"0.99875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.93894","scoring_system":"epss","scoring_elements":"0.99876","published_at":"2026-04-09T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99873","published_at":"2026-04-01T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.939","scoring_system":"epss","scoring_elements":"0.99875","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1223211","reference_id":"1223211","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1223211"},{"reference_url":"https://security.gentoo.org/glsa/201506-02","reference_id":"GLSA-201506-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201506-02"},{"reference_url":"https://security.gentoo.org/glsa/201512-10","reference_id":"GLSA-201512-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201512-10"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201605-06","reference_id":"GLSA-201605-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201605-06"},{"reference_url":"https://security.gentoo.org/glsa/201701-46","reference_id":"GLSA-201701-46","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-46"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-70","reference_id":"mfsa2015-70","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2015-70"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1072","reference_id":"RHSA-2015:1072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1185","reference_id":"RHSA-2015:1185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1197","reference_id":"RHSA-2015:1197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2056","reference_id":"RHSA-2016:2056","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2056"},{"reference_url":"https://usn.ubuntu.com/2656-1/","reference_id":"USN-2656-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-1/"},{"reference_url":"https://usn.ubuntu.com/2656-2/","reference_id":"USN-2656-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2656-2/"},{"reference_url":"https://usn.ubuntu.com/2673-1/","reference_id":"USN-2673-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2673-1/"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4000"],"risk_score":7.2,"exploitability":"2.0","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqy-gheq-cqgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31288?format=json","vulnerability_id":"VCID-s73e-gcn1-77hr","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4732.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4732.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4732","reference_id":"","reference_type":"","scores":[{"value":"0.0909","scoring_system":"epss","scoring_elements":"0.92625","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0909","scoring_system":"epss","scoring_elements":"0.92632","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0909","scoring_system":"epss","scoring_elements":"0.92638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0909","scoring_system":"epss","scoring_elements":"0.92639","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0909","scoring_system":"epss","scoring_elements":"0.9265","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0909","scoring_system":"epss","scoring_elements":"0.92654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0909","scoring_system":"epss","scoring_elements":"0.92659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0909","scoring_system":"epss","scoring_elements":"0.92658","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242240","reference_id":"1242240","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242240"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4732"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s73e-gcn1-77hr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31293?format=json","vulnerability_id":"VCID-smhf-tqrh-1bam","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4748.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4748.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4748","reference_id":"","reference_type":"","scores":[{"value":"0.07265","scoring_system":"epss","scoring_elements":"0.916","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07265","scoring_system":"epss","scoring_elements":"0.91607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07265","scoring_system":"epss","scoring_elements":"0.91613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07265","scoring_system":"epss","scoring_elements":"0.91621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07265","scoring_system":"epss","scoring_elements":"0.91633","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07265","scoring_system":"epss","scoring_elements":"0.91639","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07265","scoring_system":"epss","scoring_elements":"0.91643","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07265","scoring_system":"epss","scoring_elements":"0.91645","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07265","scoring_system":"epss","scoring_elements":"0.91642","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242281","reference_id":"1242281","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242281"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4748"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-smhf-tqrh-1bam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31317?format=json","vulnerability_id":"VCID-t1yx-brps-4yhe","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4911.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4911.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4911","reference_id":"","reference_type":"","scores":[{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91156","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91107","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91112","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91121","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91147","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91154","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10141","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10141"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77209","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77209"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2827-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2827-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273645","reference_id":"1273645","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273645"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4911","reference_id":"CVE-2015-4911","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4911"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4911"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t1yx-brps-4yhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34760?format=json","vulnerability_id":"VCID-tet1-snjs-tbfb","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4916.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4916.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4916","reference_id":"","reference_type":"","scores":[{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56853","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56948","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56969","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56945","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.57007","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56986","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4916"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.securityfocus.com/bid/77221","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77221"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273862","reference_id":"1273862","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273862"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823622","reference_id":"823622","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823622"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:javafx:2.2.85:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:javafx:2.2.85:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:javafx:2.2.85:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4916","reference_id":"CVE-2015-4916","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4916"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4916"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tet1-snjs-tbfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34759?format=json","vulnerability_id":"VCID-u4vm-t9jm-2yfv","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4908.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4908.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4908","reference_id":"","reference_type":"","scores":[{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60341","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60217","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60286","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60352","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60373","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60359","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4908"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4908","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4908"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.securityfocus.com/bid/77223","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77223"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273863","reference_id":"1273863","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273863"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823622","reference_id":"823622","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=823622"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:javafx:2.2.85:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:javafx:2.2.85:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:javafx:2.2.85:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4908","reference_id":"CVE-2015-4908","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4908"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4908"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u4vm-t9jm-2yfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31298?format=json","vulnerability_id":"VCID-u5jr-jf83-gbbb","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4803.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4803.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4803","reference_id":"","reference_type":"","scores":[{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91107","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91112","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91121","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91147","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06584","scoring_system":"epss","scoring_elements":"0.91156","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273637","reference_id":"1273637","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273637"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4803"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u5jr-jf83-gbbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34715?format=json","vulnerability_id":"VCID-ubqp-f2qp-5qcn","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0458.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0458","reference_id":"","reference_type":"","scores":[{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91738","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91751","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.9177","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91773","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91775","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0746","scoring_system":"epss","scoring_elements":"0.91771","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0458"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211771","reference_id":"1211771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211771"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0858","reference_id":"RHSA-2015:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1006","reference_id":"RHSA-2015:1006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1007","reference_id":"RHSA-2015:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1020","reference_id":"RHSA-2015:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1091","reference_id":"RHSA-2015:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1091"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0458"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ubqp-f2qp-5qcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31286?format=json","vulnerability_id":"VCID-uwxq-bbum-1yhw","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2632.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2632","reference_id":"","reference_type":"","scores":[{"value":"0.01988","scoring_system":"epss","scoring_elements":"0.83534","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01988","scoring_system":"epss","scoring_elements":"0.83546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01988","scoring_system":"epss","scoring_elements":"0.83561","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01988","scoring_system":"epss","scoring_elements":"0.83562","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01988","scoring_system":"epss","scoring_elements":"0.83586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01988","scoring_system":"epss","scoring_elements":"0.83595","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01988","scoring_system":"epss","scoring_elements":"0.8361","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01988","scoring_system":"epss","scoring_elements":"0.83603","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01988","scoring_system":"epss","scoring_elements":"0.83599","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7415"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242394","reference_id":"1242394","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1242394"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://security.gentoo.org/glsa/201701-58","reference_id":"GLSA-201701-58","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-58"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"},{"reference_url":"https://usn.ubuntu.com/2740-1/","reference_id":"USN-2740-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2740-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2632"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uwxq-bbum-1yhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31304?format=json","vulnerability_id":"VCID-vf65-ugfc-nueg","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00014.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1919.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1920.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1921.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1926.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1927.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1928.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2506.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2507.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2508.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2509.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2518.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4843.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4843.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4843","reference_id":"","reference_type":"","scores":[{"value":"0.14057","scoring_system":"epss","scoring_elements":"0.94349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.14057","scoring_system":"epss","scoring_elements":"0.9431","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14057","scoring_system":"epss","scoring_elements":"0.94319","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14057","scoring_system":"epss","scoring_elements":"0.94329","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14057","scoring_system":"epss","scoring_elements":"0.9433","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14057","scoring_system":"epss","scoring_elements":"0.94339","published_at":"2026-04-08T12:55:00Z"},{"value":"0.14057","scoring_system":"epss","scoring_elements":"0.94343","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14057","scoring_system":"epss","scoring_elements":"0.94347","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494"},{"reference_url":"http://www.debian.org/security/2015/dsa-3381","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3381"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77160","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77160"},{"reference_url":"http://www.securitytracker.com/id/1033884","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033884"},{"reference_url":"http://www.ubuntu.com/usn/USN-2784-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2784-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2827-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2827-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273053","reference_id":"1273053","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1273053"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update_101:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_85:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4843","reference_id":"CVE-2015-4843","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4843"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1919","reference_id":"RHSA-2015:1919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1920","reference_id":"RHSA-2015:1920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1921","reference_id":"RHSA-2015:1921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1926","reference_id":"RHSA-2015:1926","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1926"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1927","reference_id":"RHSA-2015:1927","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1927"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1928","reference_id":"RHSA-2015:1928","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1928"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2086","reference_id":"RHSA-2015:2086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2506","reference_id":"RHSA-2015:2506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2507","reference_id":"RHSA-2015:2507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2508","reference_id":"RHSA-2015:2508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2509","reference_id":"RHSA-2015:2509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2518","reference_id":"RHSA-2015:2518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1430","reference_id":"RHSA-2016:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1430"},{"reference_url":"https://usn.ubuntu.com/2784-1/","reference_id":"USN-2784-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2784-1/"},{"reference_url":"https://usn.ubuntu.com/2827-1/","reference_id":"USN-2827-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2827-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4843"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vf65-ugfc-nueg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34716?format=json","vulnerability_id":"VCID-w2ja-cauk-8ke2","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0459.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0459.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0459","reference_id":"","reference_type":"","scores":[{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93038","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93047","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.9305","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93058","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93063","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93068","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93066","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10041","scoring_system":"epss","scoring_elements":"0.93067","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0459"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211768","reference_id":"1211768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1211768"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0854","reference_id":"RHSA-2015:0854","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0857","reference_id":"RHSA-2015:0857","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0858","reference_id":"RHSA-2015:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1006","reference_id":"RHSA-2015:1006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1007","reference_id":"RHSA-2015:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1020","reference_id":"RHSA-2015:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1021","reference_id":"RHSA-2015:1021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1091","reference_id":"RHSA-2015:1091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1091"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-0459"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w2ja-cauk-8ke2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34740?format=json","vulnerability_id":"VCID-y1a8-8hmg-w3e3","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4729.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4729.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4729","reference_id":"","reference_type":"","scores":[{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85532","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85544","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85562","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85598","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02597","scoring_system":"epss","scoring_elements":"0.85604","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4729"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243290","reference_id":"1243290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243290"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-4729"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y1a8-8hmg-w3e3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34732?format=json","vulnerability_id":"VCID-yw9c-x1mv-3beb","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2619.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2619","reference_id":"","reference_type":"","scores":[{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84488","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84525","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84528","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84574","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02242","scoring_system":"epss","scoring_elements":"0.84565","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2619"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243286","reference_id":"1243286","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243286"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2619"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yw9c-x1mv-3beb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31280?format=json","vulnerability_id":"VCID-z8sf-9vvx-uqea","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2590.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2590.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2590","reference_id":"","reference_type":"","scores":[{"value":"0.62955","scoring_system":"epss","scoring_elements":"0.9839","published_at":"2026-04-09T12:55:00Z"},{"value":"0.62955","scoring_system":"epss","scoring_elements":"0.98388","published_at":"2026-04-08T12:55:00Z"},{"value":"0.62955","scoring_system":"epss","scoring_elements":"0.98384","published_at":"2026-04-07T12:55:00Z"},{"value":"0.62955","scoring_system":"epss","scoring_elements":"0.98377","published_at":"2026-04-02T12:55:00Z"},{"value":"0.62955","scoring_system":"epss","scoring_elements":"0.98381","published_at":"2026-04-04T12:55:00Z"},{"value":"0.62955","scoring_system":"epss","scoring_elements":"0.98392","published_at":"2026-04-13T12:55:00Z"},{"value":"0.67891","scoring_system":"epss","scoring_elements":"0.98574","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"},{"reference_url":"http://www.securitytracker.com/id/1032910","reference_id":"1032910","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://www.securitytracker.com/id/1032910"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243139","reference_id":"1243139","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1243139"},{"reference_url":"http://www.securityfocus.com/bid/75818","reference_id":"75818","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://www.securityfocus.com/bid/75818"},{"reference_url":"http://www.debian.org/security/2015/dsa-3339","reference_id":"dsa-3339","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://www.debian.org/security/2015/dsa-3339"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html","reference_id":"msg00039.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html","reference_id":"msg00040.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html","reference_id":"msg00046.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html","reference_id":"msg00047.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1228","reference_id":"RHSA-2015:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1228"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1228.html","reference_id":"RHSA-2015-1228.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1228.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1229","reference_id":"RHSA-2015:1229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1229"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1229.html","reference_id":"RHSA-2015-1229.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1229.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1230","reference_id":"RHSA-2015:1230","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1230"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1230.html","reference_id":"RHSA-2015-1230.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1230.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1241","reference_id":"RHSA-2015:1241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1241"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1241.html","reference_id":"RHSA-2015-1241.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1241.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1242","reference_id":"RHSA-2015:1242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1242"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1242.html","reference_id":"RHSA-2015-1242.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1242.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1243","reference_id":"RHSA-2015:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1243"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1243.html","reference_id":"RHSA-2015-1243.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1243.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1485","reference_id":"RHSA-2015:1485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1485"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1485.html","reference_id":"RHSA-2015-1485.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1485.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1486","reference_id":"RHSA-2015:1486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1486"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1486.html","reference_id":"RHSA-2015-1486.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1486.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1488","reference_id":"RHSA-2015:1488","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1488"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1488.html","reference_id":"RHSA-2015-1488.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1488.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1526","reference_id":"RHSA-2015:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1526"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1526.html","reference_id":"RHSA-2015-1526.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1526.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1544","reference_id":"RHSA-2015:1544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1544"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1544.html","reference_id":"RHSA-2015-1544.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1544.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1604","reference_id":"RHSA-2015:1604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1604"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1604.html","reference_id":"RHSA-2015-1604.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2015-1604.html"},{"reference_url":"https://usn.ubuntu.com/2696-1/","reference_id":"USN-2696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2696-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-2696-1","reference_id":"USN-2696-1","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://www.ubuntu.com/usn/USN-2696-1"},{"reference_url":"https://usn.ubuntu.com/2706-1/","reference_id":"USN-2706-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2706-1/"},{"reference_url":"http://www.ubuntu.com/usn/USN-2706-1","reference_id":"USN-2706-1","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T17:58:55Z/"}],"url":"http://www.ubuntu.com/usn/USN-2706-1"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}],"aliases":["CVE-2015-2590"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z8sf-9vvx-uqea"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"}