Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
Typedeb
Namespacedebian
Nameicedtea-web
Version1.8.8-4
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-34vp-a5jh-v7b4
vulnerability_id VCID-34vp-a5jh-v7b4
summary icedtea-web: GIFAR issue
references
0
reference_url http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.3/NEWS
reference_id
reference_type
scores
url http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.3/NEWS
1
reference_url http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/cb58b31c450e
reference_id
reference_type
scores
url http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/cb58b31c450e
2
reference_url http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/19f5282f53e8
reference_id
reference_type
scores
url http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/19f5282f53e8
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html
10
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html
11
reference_url http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022790.html
reference_id
reference_type
scores
url http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022790.html
12
reference_url http://osvdb.org/92544
reference_id
reference_type
scores
url http://osvdb.org/92544
13
reference_url http://rhn.redhat.com/errata/RHSA-2013-0753.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0753.html
14
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1927.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1927.json
15
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1927
reference_id
reference_type
scores
0
value 0.02232
scoring_system epss
scoring_elements 0.84462
published_at 2026-04-01T12:55:00Z
1
value 0.02232
scoring_system epss
scoring_elements 0.84497
published_at 2026-04-04T12:55:00Z
2
value 0.02232
scoring_system epss
scoring_elements 0.84499
published_at 2026-04-07T12:55:00Z
3
value 0.02232
scoring_system epss
scoring_elements 0.8452
published_at 2026-04-08T12:55:00Z
4
value 0.02232
scoring_system epss
scoring_elements 0.84526
published_at 2026-04-09T12:55:00Z
5
value 0.02232
scoring_system epss
scoring_elements 0.84544
published_at 2026-04-11T12:55:00Z
6
value 0.02232
scoring_system epss
scoring_elements 0.84539
published_at 2026-04-12T12:55:00Z
7
value 0.02232
scoring_system epss
scoring_elements 0.84535
published_at 2026-04-13T12:55:00Z
8
value 0.02232
scoring_system epss
scoring_elements 0.84478
published_at 2026-04-02T12:55:00Z
9
value 0.0249
scoring_system epss
scoring_elements 0.85336
published_at 2026-04-16T12:55:00Z
10
value 0.0249
scoring_system epss
scoring_elements 0.85365
published_at 2026-04-26T12:55:00Z
11
value 0.0249
scoring_system epss
scoring_elements 0.85364
published_at 2026-04-29T12:55:00Z
12
value 0.0249
scoring_system epss
scoring_elements 0.85356
published_at 2026-04-24T12:55:00Z
13
value 0.0249
scoring_system epss
scoring_elements 0.85337
published_at 2026-04-18T12:55:00Z
14
value 0.0249
scoring_system epss
scoring_elements 0.85334
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1927
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1927
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1927
17
reference_url http://secunia.com/advisories/53109
reference_id
reference_type
scores
url http://secunia.com/advisories/53109
18
reference_url http://secunia.com/advisories/53117
reference_id
reference_type
scores
url http://secunia.com/advisories/53117
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/83640
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/83640
20
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0123
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0123
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:146
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:146
22
reference_url http://www.securityfocus.com/bid/59286
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/59286
23
reference_url http://www.ubuntu.com/usn/USN-1804-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1804-1
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=884705
reference_id 884705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=884705
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1927
reference_id CVE-2013-1927
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1927
51
reference_url https://access.redhat.com/errata/RHSA-2013:0753
reference_id RHSA-2013:0753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0753
52
reference_url https://usn.ubuntu.com/1804-1/
reference_id USN-1804-1
reference_type
scores
url https://usn.ubuntu.com/1804-1/
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.3.2-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.3.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.3.2-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2013-1927
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-34vp-a5jh-v7b4
1
url VCID-7kjg-u6mz-nycc
vulnerability_id VCID-7kjg-u6mz-nycc
summary icedtea-web: class loader sharing for applets with same codebase paths
references
0
reference_url http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.3/NEWS
reference_id
reference_type
scores
url http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.3/NEWS
1
reference_url http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/34b6f60ae586
reference_id
reference_type
scores
url http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/34b6f60ae586
2
reference_url http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/25dd7c7ac39c
reference_id
reference_type
scores
url http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/25dd7c7ac39c
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html
10
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html
11
reference_url http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022790.html
reference_id
reference_type
scores
url http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022790.html
12
reference_url http://osvdb.org/92543
reference_id
reference_type
scores
url http://osvdb.org/92543
13
reference_url http://rhn.redhat.com/errata/RHSA-2013-0753.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0753.html
14
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1926.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1926.json
15
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1926
reference_id
reference_type
scores
0
value 0.00883
scoring_system epss
scoring_elements 0.75482
published_at 2026-04-29T12:55:00Z
1
value 0.00883
scoring_system epss
scoring_elements 0.75347
published_at 2026-04-01T12:55:00Z
2
value 0.00883
scoring_system epss
scoring_elements 0.7535
published_at 2026-04-02T12:55:00Z
3
value 0.00883
scoring_system epss
scoring_elements 0.75382
published_at 2026-04-04T12:55:00Z
4
value 0.00883
scoring_system epss
scoring_elements 0.75361
published_at 2026-04-07T12:55:00Z
5
value 0.00883
scoring_system epss
scoring_elements 0.75404
published_at 2026-04-08T12:55:00Z
6
value 0.00883
scoring_system epss
scoring_elements 0.75414
published_at 2026-04-09T12:55:00Z
7
value 0.00883
scoring_system epss
scoring_elements 0.75434
published_at 2026-04-11T12:55:00Z
8
value 0.00883
scoring_system epss
scoring_elements 0.75412
published_at 2026-04-12T12:55:00Z
9
value 0.00883
scoring_system epss
scoring_elements 0.75401
published_at 2026-04-13T12:55:00Z
10
value 0.00883
scoring_system epss
scoring_elements 0.75443
published_at 2026-04-16T12:55:00Z
11
value 0.00883
scoring_system epss
scoring_elements 0.75448
published_at 2026-04-18T12:55:00Z
12
value 0.00883
scoring_system epss
scoring_elements 0.75438
published_at 2026-04-21T12:55:00Z
13
value 0.00883
scoring_system epss
scoring_elements 0.75473
published_at 2026-04-24T12:55:00Z
14
value 0.00883
scoring_system epss
scoring_elements 0.75477
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1926
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1926
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1926
17
reference_url http://secunia.com/advisories/53109
reference_id
reference_type
scores
url http://secunia.com/advisories/53109
18
reference_url http://secunia.com/advisories/53117
reference_id
reference_type
scores
url http://secunia.com/advisories/53117
19
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/83642
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/83642
20
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0123
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0123
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:146
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:146
22
reference_url http://www.securityfocus.com/bid/59281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/59281
23
reference_url http://www.ubuntu.com/usn/USN-1804-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1804-1
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=916774
reference_id 916774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=916774
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1926
reference_id CVE-2013-1926
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1926
51
reference_url https://access.redhat.com/errata/RHSA-2013:0753
reference_id RHSA-2013:0753
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0753
52
reference_url https://usn.ubuntu.com/1804-1/
reference_id USN-1804-1
reference_type
scores
url https://usn.ubuntu.com/1804-1/
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.3.2-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.3.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.3.2-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2013-1926
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7kjg-u6mz-nycc
2
url VCID-86kr-2g2x-pbek
vulnerability_id VCID-86kr-2g2x-pbek
summary icedtea-web: unexpected permanent authorization of unsigned applets
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5234.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5234.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5234
reference_id
reference_type
scores
0
value 0.0092
scoring_system epss
scoring_elements 0.75903
published_at 2026-04-01T12:55:00Z
1
value 0.0092
scoring_system epss
scoring_elements 0.75906
published_at 2026-04-02T12:55:00Z
2
value 0.0092
scoring_system epss
scoring_elements 0.75938
published_at 2026-04-04T12:55:00Z
3
value 0.0092
scoring_system epss
scoring_elements 0.75917
published_at 2026-04-07T12:55:00Z
4
value 0.0092
scoring_system epss
scoring_elements 0.7595
published_at 2026-04-08T12:55:00Z
5
value 0.0092
scoring_system epss
scoring_elements 0.75964
published_at 2026-04-09T12:55:00Z
6
value 0.0092
scoring_system epss
scoring_elements 0.75988
published_at 2026-04-11T12:55:00Z
7
value 0.0092
scoring_system epss
scoring_elements 0.75965
published_at 2026-04-12T12:55:00Z
8
value 0.0092
scoring_system epss
scoring_elements 0.75958
published_at 2026-04-13T12:55:00Z
9
value 0.0092
scoring_system epss
scoring_elements 0.75996
published_at 2026-04-16T12:55:00Z
10
value 0.0092
scoring_system epss
scoring_elements 0.75999
published_at 2026-04-18T12:55:00Z
11
value 0.0092
scoring_system epss
scoring_elements 0.75983
published_at 2026-04-21T12:55:00Z
12
value 0.0092
scoring_system epss
scoring_elements 0.76021
published_at 2026-04-24T12:55:00Z
13
value 0.0092
scoring_system epss
scoring_elements 0.76031
published_at 2026-04-26T12:55:00Z
14
value 0.0092
scoring_system epss
scoring_elements 0.76042
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5234
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5234
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5234
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1233667
reference_id 1233667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1233667
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798467
reference_id 798467
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798467
5
reference_url https://access.redhat.com/errata/RHSA-2016:0778
reference_id RHSA-2016:0778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0778
6
reference_url https://usn.ubuntu.com/2817-1/
reference_id USN-2817-1
reference_type
scores
url https://usn.ubuntu.com/2817-1/
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.6.1-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.6.1-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2015-5234
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-86kr-2g2x-pbek
3
url VCID-87f2-a1zb-7qgp
vulnerability_id VCID-87f2-a1zb-7qgp
summary heap-based buffer overflow
references
0
reference_url http://icedtea.classpath.org/hg/release/icedtea-web-1.1/file/d759ec560073/NEWS
reference_id
reference_type
scores
url http://icedtea.classpath.org/hg/release/icedtea-web-1.1/file/d759ec560073/NEWS
1
reference_url http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/596a718be03f
reference_id
reference_type
scores
url http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/596a718be03f
2
reference_url http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/e7970f3da5fe
reference_id
reference_type
scores
url http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/e7970f3da5fe
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2012-11/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-11/msg00040.html
5
reference_url http://lists.opensuse.org/opensuse-updates/2013-01/msg00065.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-01/msg00065.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2013-09/msg00071.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-09/msg00071.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2013-09/msg00073.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-09/msg00073.html
8
reference_url http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-November/020775.html
reference_id
reference_type
scores
url http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-November/020775.html
9
reference_url http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-September/024750.html
reference_id
reference_type
scores
url http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-September/024750.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2012-1434.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1434.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4540.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4540.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4540
reference_id
reference_type
scores
0
value 0.01487
scoring_system epss
scoring_elements 0.81111
published_at 2026-04-29T12:55:00Z
1
value 0.01487
scoring_system epss
scoring_elements 0.80975
published_at 2026-04-01T12:55:00Z
2
value 0.01487
scoring_system epss
scoring_elements 0.80984
published_at 2026-04-02T12:55:00Z
3
value 0.01487
scoring_system epss
scoring_elements 0.81007
published_at 2026-04-04T12:55:00Z
4
value 0.01487
scoring_system epss
scoring_elements 0.81006
published_at 2026-04-07T12:55:00Z
5
value 0.01487
scoring_system epss
scoring_elements 0.81034
published_at 2026-04-08T12:55:00Z
6
value 0.01487
scoring_system epss
scoring_elements 0.81041
published_at 2026-04-09T12:55:00Z
7
value 0.01487
scoring_system epss
scoring_elements 0.81058
published_at 2026-04-11T12:55:00Z
8
value 0.01487
scoring_system epss
scoring_elements 0.81044
published_at 2026-04-12T12:55:00Z
9
value 0.01487
scoring_system epss
scoring_elements 0.81037
published_at 2026-04-13T12:55:00Z
10
value 0.01487
scoring_system epss
scoring_elements 0.81074
published_at 2026-04-16T12:55:00Z
11
value 0.01487
scoring_system epss
scoring_elements 0.81076
published_at 2026-04-18T12:55:00Z
12
value 0.01487
scoring_system epss
scoring_elements 0.81072
published_at 2026-04-21T12:55:00Z
13
value 0.01487
scoring_system epss
scoring_elements 0.81095
published_at 2026-04-24T12:55:00Z
14
value 0.01487
scoring_system epss
scoring_elements 0.81103
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4540
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4540
14
reference_url http://secunia.com/advisories/51206
reference_id
reference_type
scores
url http://secunia.com/advisories/51206
15
reference_url http://secunia.com/advisories/51220
reference_id
reference_type
scores
url http://secunia.com/advisories/51220
16
reference_url http://secunia.com/advisories/51374
reference_id
reference_type
scores
url http://secunia.com/advisories/51374
17
reference_url http://security.gentoo.org/glsa/glsa-201406-32.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201406-32.xml
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79894
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79894
19
reference_url http://www.debian.org/security/2013/dsa-2768
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2768
20
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:171
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:171
21
reference_url http://www.openwall.com/lists/oss-security/2012/11/07/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/07/5
22
reference_url http://www.securityfocus.com/bid/56434
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/56434
23
reference_url http://www.securityfocus.com/bid/62426
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/62426
24
reference_url http://www.securitytracker.com/id?1027738
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027738
25
reference_url http://www.ubuntu.com/usn/USN-1625-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1625-1
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692608
reference_id 692608
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692608
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=869040
reference_id 869040
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=869040
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4540
reference_id CVE-2012-4540
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4540
41
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
42
reference_url https://access.redhat.com/errata/RHSA-2012:1434
reference_id RHSA-2012:1434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1434
43
reference_url https://usn.ubuntu.com/1625-1/
reference_id USN-1625-1
reference_type
scores
url https://usn.ubuntu.com/1625-1/
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.3.1-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.3.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.3.1-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2012-4540
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-87f2-a1zb-7qgp
4
url VCID-92b2-qrv6-vyh3
vulnerability_id VCID-92b2-qrv6-vyh3
summary icedtea-web: applet origin spoofing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5235.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5235.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5235
reference_id
reference_type
scores
0
value 0.00938
scoring_system epss
scoring_elements 0.76145
published_at 2026-04-01T12:55:00Z
1
value 0.00938
scoring_system epss
scoring_elements 0.7615
published_at 2026-04-02T12:55:00Z
2
value 0.00938
scoring_system epss
scoring_elements 0.76182
published_at 2026-04-04T12:55:00Z
3
value 0.00938
scoring_system epss
scoring_elements 0.76162
published_at 2026-04-07T12:55:00Z
4
value 0.00938
scoring_system epss
scoring_elements 0.76195
published_at 2026-04-08T12:55:00Z
5
value 0.00938
scoring_system epss
scoring_elements 0.76208
published_at 2026-04-09T12:55:00Z
6
value 0.00938
scoring_system epss
scoring_elements 0.76233
published_at 2026-04-11T12:55:00Z
7
value 0.00938
scoring_system epss
scoring_elements 0.76209
published_at 2026-04-12T12:55:00Z
8
value 0.00938
scoring_system epss
scoring_elements 0.76207
published_at 2026-04-13T12:55:00Z
9
value 0.00938
scoring_system epss
scoring_elements 0.76248
published_at 2026-04-16T12:55:00Z
10
value 0.00938
scoring_system epss
scoring_elements 0.76253
published_at 2026-04-18T12:55:00Z
11
value 0.00938
scoring_system epss
scoring_elements 0.76235
published_at 2026-04-21T12:55:00Z
12
value 0.00938
scoring_system epss
scoring_elements 0.76273
published_at 2026-04-24T12:55:00Z
13
value 0.00938
scoring_system epss
scoring_elements 0.76282
published_at 2026-04-26T12:55:00Z
14
value 0.00938
scoring_system epss
scoring_elements 0.76295
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5235
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5235
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5235
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1233697
reference_id 1233697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1233697
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798467
reference_id 798467
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798467
5
reference_url https://access.redhat.com/errata/RHSA-2016:0778
reference_id RHSA-2016:0778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0778
6
reference_url https://usn.ubuntu.com/2817-1/
reference_id USN-2817-1
reference_type
scores
url https://usn.ubuntu.com/2817-1/
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.6.1-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.6.1-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2015-5235
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92b2-qrv6-vyh3
5
url VCID-daey-rnba-1ue9
vulnerability_id VCID-daey-rnba-1ue9
summary IcedTea-Web: second-level domain subdomains and suffix domain SOP bypass
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3377.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3377.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3377
reference_id
reference_type
scores
0
value 0.00971
scoring_system epss
scoring_elements 0.76582
published_at 2026-04-01T12:55:00Z
1
value 0.00971
scoring_system epss
scoring_elements 0.76585
published_at 2026-04-02T12:55:00Z
2
value 0.00971
scoring_system epss
scoring_elements 0.76614
published_at 2026-04-04T12:55:00Z
3
value 0.00971
scoring_system epss
scoring_elements 0.76594
published_at 2026-04-07T12:55:00Z
4
value 0.00971
scoring_system epss
scoring_elements 0.76626
published_at 2026-04-08T12:55:00Z
5
value 0.00971
scoring_system epss
scoring_elements 0.76638
published_at 2026-04-09T12:55:00Z
6
value 0.00971
scoring_system epss
scoring_elements 0.76664
published_at 2026-04-11T12:55:00Z
7
value 0.00971
scoring_system epss
scoring_elements 0.76644
published_at 2026-04-12T12:55:00Z
8
value 0.00971
scoring_system epss
scoring_elements 0.76635
published_at 2026-04-13T12:55:00Z
9
value 0.00971
scoring_system epss
scoring_elements 0.76676
published_at 2026-04-16T12:55:00Z
10
value 0.00971
scoring_system epss
scoring_elements 0.76681
published_at 2026-04-18T12:55:00Z
11
value 0.00971
scoring_system epss
scoring_elements 0.76669
published_at 2026-04-21T12:55:00Z
12
value 0.00971
scoring_system epss
scoring_elements 0.767
published_at 2026-04-24T12:55:00Z
13
value 0.00971
scoring_system epss
scoring_elements 0.76707
published_at 2026-04-26T12:55:00Z
14
value 0.00971
scoring_system epss
scoring_elements 0.76719
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3377
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3377
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3377
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=742515
reference_id 742515
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=742515
4
reference_url https://access.redhat.com/errata/RHSA-2011:1441
reference_id RHSA-2011:1441
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1441
5
reference_url https://usn.ubuntu.com/1263-1/
reference_id USN-1263-1
reference_type
scores
url https://usn.ubuntu.com/1263-1/
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.1.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.1.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.1.4-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2011-3377
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-daey-rnba-1ue9
6
url VCID-efq2-j3vx-y3g5
vulnerability_id VCID-efq2-j3vx-y3g5
summary icedtea-web: insecure temporary file use flaw in LiveConnect implementation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6493.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6493.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6493
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18667
published_at 2026-04-01T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18804
published_at 2026-04-02T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18857
published_at 2026-04-04T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18578
published_at 2026-04-07T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18658
published_at 2026-04-08T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18713
published_at 2026-04-09T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18718
published_at 2026-04-11T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.1867
published_at 2026-04-12T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.1862
published_at 2026-04-13T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18565
published_at 2026-04-16T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18574
published_at 2026-04-18T12:55:00Z
11
value 0.00059
scoring_system epss
scoring_elements 0.18594
published_at 2026-04-21T12:55:00Z
12
value 0.00059
scoring_system epss
scoring_elements 0.18487
published_at 2026-04-24T12:55:00Z
13
value 0.00059
scoring_system epss
scoring_elements 0.18473
published_at 2026-04-26T12:55:00Z
14
value 0.00059
scoring_system epss
scoring_elements 0.18431
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6493
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6493
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6493
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1010958
reference_id 1010958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1010958
4
reference_url https://usn.ubuntu.com/2131-1/
reference_id USN-2131-1
reference_type
scores
url https://usn.ubuntu.com/2131-1/
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.4.2-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.4.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.4.2-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2013-6493
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-efq2-j3vx-y3g5
7
url VCID-h1z1-778q-13g1
vulnerability_id VCID-h1z1-778q-13g1
summary icedtea-web: home directory path disclosure to untrusted applications
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2513.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2513.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2513
reference_id
reference_type
scores
0
value 0.005
scoring_system epss
scoring_elements 0.6588
published_at 2026-04-01T12:55:00Z
1
value 0.005
scoring_system epss
scoring_elements 0.65921
published_at 2026-04-02T12:55:00Z
2
value 0.005
scoring_system epss
scoring_elements 0.65951
published_at 2026-04-04T12:55:00Z
3
value 0.005
scoring_system epss
scoring_elements 0.65918
published_at 2026-04-07T12:55:00Z
4
value 0.005
scoring_system epss
scoring_elements 0.65969
published_at 2026-04-08T12:55:00Z
5
value 0.005
scoring_system epss
scoring_elements 0.65981
published_at 2026-04-09T12:55:00Z
6
value 0.005
scoring_system epss
scoring_elements 0.65999
published_at 2026-04-11T12:55:00Z
7
value 0.005
scoring_system epss
scoring_elements 0.65986
published_at 2026-04-12T12:55:00Z
8
value 0.005
scoring_system epss
scoring_elements 0.65956
published_at 2026-04-13T12:55:00Z
9
value 0.005
scoring_system epss
scoring_elements 0.65991
published_at 2026-04-16T12:55:00Z
10
value 0.005
scoring_system epss
scoring_elements 0.66005
published_at 2026-04-18T12:55:00Z
11
value 0.005
scoring_system epss
scoring_elements 0.65992
published_at 2026-04-21T12:55:00Z
12
value 0.005
scoring_system epss
scoring_elements 0.66012
published_at 2026-04-24T12:55:00Z
13
value 0.005
scoring_system epss
scoring_elements 0.66024
published_at 2026-04-26T12:55:00Z
14
value 0.005
scoring_system epss
scoring_elements 0.66022
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2513
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2513
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=718164
reference_id 718164
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=718164
4
reference_url https://access.redhat.com/errata/RHSA-2011:1100
reference_id RHSA-2011:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1100
5
reference_url https://usn.ubuntu.com/1178-1/
reference_id USN-1178-1
reference_type
scores
url https://usn.ubuntu.com/1178-1/
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.1.2-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.1.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.1.2-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2011-2513
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h1z1-778q-13g1
8
url VCID-hqcx-4f8z-2fhe
vulnerability_id VCID-hqcx-4f8z-2fhe
summary
Multiple vulnerabilities have been found in IcedTeaWeb, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10181.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10181.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10181
reference_id
reference_type
scores
0
value 0.00398
scoring_system epss
scoring_elements 0.60464
published_at 2026-04-01T12:55:00Z
1
value 0.00398
scoring_system epss
scoring_elements 0.60607
published_at 2026-04-29T12:55:00Z
2
value 0.00398
scoring_system epss
scoring_elements 0.60606
published_at 2026-04-24T12:55:00Z
3
value 0.00398
scoring_system epss
scoring_elements 0.60618
published_at 2026-04-26T12:55:00Z
4
value 0.00398
scoring_system epss
scoring_elements 0.6054
published_at 2026-04-02T12:55:00Z
5
value 0.00398
scoring_system epss
scoring_elements 0.60566
published_at 2026-04-04T12:55:00Z
6
value 0.00398
scoring_system epss
scoring_elements 0.60535
published_at 2026-04-07T12:55:00Z
7
value 0.00398
scoring_system epss
scoring_elements 0.60584
published_at 2026-04-08T12:55:00Z
8
value 0.00398
scoring_system epss
scoring_elements 0.606
published_at 2026-04-09T12:55:00Z
9
value 0.00398
scoring_system epss
scoring_elements 0.60624
published_at 2026-04-11T12:55:00Z
10
value 0.00398
scoring_system epss
scoring_elements 0.60609
published_at 2026-04-12T12:55:00Z
11
value 0.00398
scoring_system epss
scoring_elements 0.60588
published_at 2026-04-13T12:55:00Z
12
value 0.00398
scoring_system epss
scoring_elements 0.60629
published_at 2026-04-16T12:55:00Z
13
value 0.00398
scoring_system epss
scoring_elements 0.60634
published_at 2026-04-18T12:55:00Z
14
value 0.00398
scoring_system epss
scoring_elements 0.60622
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10181
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10181
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1725928
reference_id 1725928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1725928
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934319
reference_id 934319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934319
6
reference_url https://security.archlinux.org/AVG-1017
reference_id AVG-1017
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1017
7
reference_url https://security.gentoo.org/glsa/202107-51
reference_id GLSA-202107-51
reference_type
scores
url https://security.gentoo.org/glsa/202107-51
8
reference_url https://access.redhat.com/errata/RHSA-2019:2003
reference_id RHSA-2019:2003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2003
9
reference_url https://access.redhat.com/errata/RHSA-2019:2004
reference_id RHSA-2019:2004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2004
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.8.3-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2019-10181
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hqcx-4f8z-2fhe
9
url VCID-ke24-ysxj-xbes
vulnerability_id VCID-ke24-ysxj-xbes
summary icedtea-web: Java Web Start security warning dialog manipulation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2514.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2514.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2514
reference_id
reference_type
scores
0
value 0.00878
scoring_system epss
scoring_elements 0.75269
published_at 2026-04-01T12:55:00Z
1
value 0.00878
scoring_system epss
scoring_elements 0.75272
published_at 2026-04-02T12:55:00Z
2
value 0.00878
scoring_system epss
scoring_elements 0.75305
published_at 2026-04-04T12:55:00Z
3
value 0.00878
scoring_system epss
scoring_elements 0.75283
published_at 2026-04-07T12:55:00Z
4
value 0.00878
scoring_system epss
scoring_elements 0.75326
published_at 2026-04-08T12:55:00Z
5
value 0.00878
scoring_system epss
scoring_elements 0.75337
published_at 2026-04-09T12:55:00Z
6
value 0.00878
scoring_system epss
scoring_elements 0.75358
published_at 2026-04-11T12:55:00Z
7
value 0.00878
scoring_system epss
scoring_elements 0.75336
published_at 2026-04-12T12:55:00Z
8
value 0.00878
scoring_system epss
scoring_elements 0.75325
published_at 2026-04-13T12:55:00Z
9
value 0.00878
scoring_system epss
scoring_elements 0.75365
published_at 2026-04-16T12:55:00Z
10
value 0.00878
scoring_system epss
scoring_elements 0.75371
published_at 2026-04-18T12:55:00Z
11
value 0.00878
scoring_system epss
scoring_elements 0.75361
published_at 2026-04-21T12:55:00Z
12
value 0.00878
scoring_system epss
scoring_elements 0.75396
published_at 2026-04-24T12:55:00Z
13
value 0.00878
scoring_system epss
scoring_elements 0.754
published_at 2026-04-26T12:55:00Z
14
value 0.00878
scoring_system epss
scoring_elements 0.75405
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2514
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2514
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=718170
reference_id 718170
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=718170
4
reference_url https://access.redhat.com/errata/RHSA-2011:1100
reference_id RHSA-2011:1100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1100
5
reference_url https://usn.ubuntu.com/1178-1/
reference_id USN-1178-1
reference_type
scores
url https://usn.ubuntu.com/1178-1/
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.1-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.1-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2011-2514
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ke24-ysxj-xbes
10
url VCID-n151-1sjk-eudx
vulnerability_id VCID-n151-1sjk-eudx
summary
Multiple vulnerabilities have been found in IcedTeaWeb, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10185.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10185
reference_id
reference_type
scores
0
value 0.01854
scoring_system epss
scoring_elements 0.8309
published_at 2026-04-29T12:55:00Z
1
value 0.01854
scoring_system epss
scoring_elements 0.83052
published_at 2026-04-21T12:55:00Z
2
value 0.01854
scoring_system epss
scoring_elements 0.83075
published_at 2026-04-24T12:55:00Z
3
value 0.01854
scoring_system epss
scoring_elements 0.83083
published_at 2026-04-26T12:55:00Z
4
value 0.01926
scoring_system epss
scoring_elements 0.8332
published_at 2026-04-02T12:55:00Z
5
value 0.01926
scoring_system epss
scoring_elements 0.83335
published_at 2026-04-07T12:55:00Z
6
value 0.01926
scoring_system epss
scoring_elements 0.83359
published_at 2026-04-08T12:55:00Z
7
value 0.01926
scoring_system epss
scoring_elements 0.83369
published_at 2026-04-09T12:55:00Z
8
value 0.01926
scoring_system epss
scoring_elements 0.83384
published_at 2026-04-11T12:55:00Z
9
value 0.01926
scoring_system epss
scoring_elements 0.83378
published_at 2026-04-12T12:55:00Z
10
value 0.01926
scoring_system epss
scoring_elements 0.83373
published_at 2026-04-13T12:55:00Z
11
value 0.01926
scoring_system epss
scoring_elements 0.83409
published_at 2026-04-16T12:55:00Z
12
value 0.01926
scoring_system epss
scoring_elements 0.8341
published_at 2026-04-18T12:55:00Z
13
value 0.01926
scoring_system epss
scoring_elements 0.83305
published_at 2026-04-01T12:55:00Z
14
value 0.01926
scoring_system epss
scoring_elements 0.83336
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10185
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1724989
reference_id 1724989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1724989
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934319
reference_id 934319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934319
6
reference_url https://security.archlinux.org/AVG-1017
reference_id AVG-1017
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1017
7
reference_url https://security.gentoo.org/glsa/202107-51
reference_id GLSA-202107-51
reference_type
scores
url https://security.gentoo.org/glsa/202107-51
8
reference_url https://access.redhat.com/errata/RHSA-2019:2003
reference_id RHSA-2019:2003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2003
9
reference_url https://access.redhat.com/errata/RHSA-2019:2004
reference_id RHSA-2019:2004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2004
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.8.3-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2019-10185
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n151-1sjk-eudx
11
url VCID-tc7a-29c8-b3dx
vulnerability_id VCID-tc7a-29c8-b3dx
summary
Multiple vulnerabilities have been found in the IcedTea JDK, the
    worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3423.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3423
reference_id
reference_type
scores
0
value 0.0278
scoring_system epss
scoring_elements 0.85998
published_at 2026-04-01T12:55:00Z
1
value 0.0278
scoring_system epss
scoring_elements 0.86009
published_at 2026-04-02T12:55:00Z
2
value 0.0278
scoring_system epss
scoring_elements 0.86026
published_at 2026-04-07T12:55:00Z
3
value 0.0278
scoring_system epss
scoring_elements 0.86045
published_at 2026-04-08T12:55:00Z
4
value 0.0278
scoring_system epss
scoring_elements 0.86055
published_at 2026-04-09T12:55:00Z
5
value 0.0278
scoring_system epss
scoring_elements 0.86069
published_at 2026-04-11T12:55:00Z
6
value 0.0278
scoring_system epss
scoring_elements 0.86067
published_at 2026-04-12T12:55:00Z
7
value 0.0278
scoring_system epss
scoring_elements 0.86062
published_at 2026-04-13T12:55:00Z
8
value 0.0278
scoring_system epss
scoring_elements 0.8608
published_at 2026-04-16T12:55:00Z
9
value 0.0278
scoring_system epss
scoring_elements 0.86085
published_at 2026-04-18T12:55:00Z
10
value 0.0278
scoring_system epss
scoring_elements 0.86077
published_at 2026-04-21T12:55:00Z
11
value 0.0278
scoring_system epss
scoring_elements 0.86097
published_at 2026-04-24T12:55:00Z
12
value 0.0278
scoring_system epss
scoring_elements 0.86106
published_at 2026-04-26T12:55:00Z
13
value 0.0278
scoring_system epss
scoring_elements 0.86107
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3423
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3423
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=841345
reference_id 841345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=841345
4
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
5
reference_url https://access.redhat.com/errata/RHSA-2012:1132
reference_id RHSA-2012:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1132
6
reference_url https://usn.ubuntu.com/1521-1/
reference_id USN-1521-1
reference_type
scores
url https://usn.ubuntu.com/1521-1/
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.3-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2012-3423
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tc7a-29c8-b3dx
12
url VCID-u5rh-7y7v-8yfm
vulnerability_id VCID-u5rh-7y7v-8yfm
summary icedtea-web: path traversal while processing <jar/> elements of JNLP files results in arbitrary file overwrite
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10182.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10182.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10182
reference_id
reference_type
scores
0
value 0.01052
scoring_system epss
scoring_elements 0.77642
published_at 2026-04-29T12:55:00Z
1
value 0.01052
scoring_system epss
scoring_elements 0.77587
published_at 2026-04-21T12:55:00Z
2
value 0.01052
scoring_system epss
scoring_elements 0.7762
published_at 2026-04-24T12:55:00Z
3
value 0.01052
scoring_system epss
scoring_elements 0.77626
published_at 2026-04-26T12:55:00Z
4
value 0.01438
scoring_system epss
scoring_elements 0.80655
published_at 2026-04-02T12:55:00Z
5
value 0.01438
scoring_system epss
scoring_elements 0.80672
published_at 2026-04-07T12:55:00Z
6
value 0.01438
scoring_system epss
scoring_elements 0.80701
published_at 2026-04-08T12:55:00Z
7
value 0.01438
scoring_system epss
scoring_elements 0.80711
published_at 2026-04-09T12:55:00Z
8
value 0.01438
scoring_system epss
scoring_elements 0.80727
published_at 2026-04-11T12:55:00Z
9
value 0.01438
scoring_system epss
scoring_elements 0.80713
published_at 2026-04-12T12:55:00Z
10
value 0.01438
scoring_system epss
scoring_elements 0.80705
published_at 2026-04-13T12:55:00Z
11
value 0.01438
scoring_system epss
scoring_elements 0.80741
published_at 2026-04-18T12:55:00Z
12
value 0.01438
scoring_system epss
scoring_elements 0.80647
published_at 2026-04-01T12:55:00Z
13
value 0.01438
scoring_system epss
scoring_elements 0.80677
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10182
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10182
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1724958
reference_id 1724958
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1724958
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934319
reference_id 934319
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934319
6
reference_url https://security.archlinux.org/AVG-1017
reference_id AVG-1017
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1017
7
reference_url https://access.redhat.com/errata/RHSA-2019:2003
reference_id RHSA-2019:2003
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2003
8
reference_url https://access.redhat.com/errata/RHSA-2019:2004
reference_id RHSA-2019:2004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2004
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.8.3-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.3-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2019-10182
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u5rh-7y7v-8yfm
13
url VCID-wkkv-61uc-jufm
vulnerability_id VCID-wkkv-61uc-jufm
summary
Multiple vulnerabilities have been found in the IcedTea JDK, the
    worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3422.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3422.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3422
reference_id
reference_type
scores
0
value 0.01173
scoring_system epss
scoring_elements 0.78638
published_at 2026-04-01T12:55:00Z
1
value 0.01173
scoring_system epss
scoring_elements 0.78644
published_at 2026-04-02T12:55:00Z
2
value 0.01173
scoring_system epss
scoring_elements 0.78674
published_at 2026-04-04T12:55:00Z
3
value 0.01173
scoring_system epss
scoring_elements 0.78655
published_at 2026-04-07T12:55:00Z
4
value 0.01173
scoring_system epss
scoring_elements 0.78681
published_at 2026-04-08T12:55:00Z
5
value 0.01173
scoring_system epss
scoring_elements 0.78687
published_at 2026-04-09T12:55:00Z
6
value 0.01173
scoring_system epss
scoring_elements 0.78712
published_at 2026-04-18T12:55:00Z
7
value 0.01173
scoring_system epss
scoring_elements 0.78693
published_at 2026-04-12T12:55:00Z
8
value 0.01173
scoring_system epss
scoring_elements 0.78686
published_at 2026-04-13T12:55:00Z
9
value 0.01173
scoring_system epss
scoring_elements 0.78714
published_at 2026-04-16T12:55:00Z
10
value 0.01173
scoring_system epss
scoring_elements 0.78709
published_at 2026-04-21T12:55:00Z
11
value 0.01173
scoring_system epss
scoring_elements 0.78737
published_at 2026-04-24T12:55:00Z
12
value 0.01173
scoring_system epss
scoring_elements 0.78745
published_at 2026-04-26T12:55:00Z
13
value 0.01173
scoring_system epss
scoring_elements 0.78762
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3422
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3422
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=840592
reference_id 840592
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=840592
4
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
5
reference_url https://access.redhat.com/errata/RHSA-2012:1132
reference_id RHSA-2012:1132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1132
6
reference_url https://usn.ubuntu.com/1521-1/
reference_id USN-1521-1
reference_type
scores
url https://usn.ubuntu.com/1521-1/
fixed_packages
0
url pkg:deb/debian/icedtea-web@1.3-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.3-1%3Fdistro=trixie
1
url pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie
2
url pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie
3
url pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie
4
url pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
purl pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie
aliases CVE-2012-3422
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wkkv-61uc-jufm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie