{"url":"http://public2.vulnerablecode.io/api/packages/925227?format=json","purl":"pkg:deb/debian/icu@52.1-7?distro=trixie","type":"deb","namespace":"debian","name":"icu","version":"52.1-7","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"52.1-7.1","latest_non_vulnerable_version":"78.3-2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31270?format=json","vulnerability_id":"VCID-nyhx-9tes-9ygr","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6591.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6591.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6591","reference_id":"","reference_type":"","scores":[{"value":"0.0178","scoring_system":"epss","scoring_elements":"0.82775","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0178","scoring_system":"epss","scoring_elements":"0.82794","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0178","scoring_system":"epss","scoring_elements":"0.82815","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0178","scoring_system":"epss","scoring_elements":"0.82836","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0178","scoring_system":"epss","scoring_elements":"0.82835","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0178","scoring_system":"epss","scoring_elements":"0.8285","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.8478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84775","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.8477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84697","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84793","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84817","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84827","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84791","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84733","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84755","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84762","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183646","reference_id":"1183646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183646"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775884","reference_id":"775884","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775884"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0067","reference_id":"RHSA-2015:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0068","reference_id":"RHSA-2015:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0085","reference_id":"RHSA-2015:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0133","reference_id":"RHSA-2015:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0134","reference_id":"RHSA-2015:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0135","reference_id":"RHSA-2015:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0136","reference_id":"RHSA-2015:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0263","reference_id":"RHSA-2015:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"},{"reference_url":"https://usn.ubuntu.com/2522-1/","reference_id":"USN-2522-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2522-1/"},{"reference_url":"https://usn.ubuntu.com/2522-3/","reference_id":"USN-2522-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2522-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925227?format=json","purl":"pkg:deb/debian/icu@52.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@52.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925218?format=json","purl":"pkg:deb/debian/icu@67.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@67.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925216?format=json","purl":"pkg:deb/debian/icu@72.1-3%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@72.1-3%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925220?format=json","purl":"pkg:deb/debian/icu@76.1-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@76.1-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925219?format=json","purl":"pkg:deb/debian/icu@78.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@78.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108325?format=json","purl":"pkg:deb/debian/icu@78.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@78.3-2%3Fdistro=trixie"}],"aliases":["CVE-2014-6591"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nyhx-9tes-9ygr"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@52.1-7%3Fdistro=trixie"}