{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","type":"deb","namespace":"debian","name":"openjdk-8","version":"8u40~b22-1","qualifiers":{"distro":"sid"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8u45-b14-1","latest_non_vulnerable_version":"8u492-ga-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34714?format=json","vulnerability_id":"VCID-42p6-1tu2-pybt","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0437.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0437.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0437","reference_id":"","reference_type":"","scores":[{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76818","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76849","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76868","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76858","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76888","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76905","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76893","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77807","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79169","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79128","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79146","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.7917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79172","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0437"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183670","reference_id":"1183670","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183670"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0437"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-42p6-1tu2-pybt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31271?format=json","vulnerability_id":"VCID-753c-x7gd-37dd","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6593.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6593.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6593","reference_id":"","reference_type":"","scores":[{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.98656","published_at":"2026-04-01T12:55:00Z"},{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.98657","published_at":"2026-04-02T12:55:00Z"},{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.9866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.98663","published_at":"2026-04-07T12:55:00Z"},{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.98664","published_at":"2026-04-08T12:55:00Z"},{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.98665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.98667","published_at":"2026-04-11T12:55:00Z"},{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.98668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.98669","published_at":"2026-04-13T12:55:00Z"},{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.98672","published_at":"2026-04-16T12:55:00Z"},{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.98673","published_at":"2026-04-21T12:55:00Z"},{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.98677","published_at":"2026-04-24T12:55:00Z"},{"value":"0.69879","scoring_system":"epss","scoring_elements":"0.98678","published_at":"2026-04-26T12:55:00Z"},{"value":"0.71774","scoring_system":"epss","scoring_elements":"0.98747","published_at":"2026-04-29T12:55:00Z"},{"value":"0.71774","scoring_system":"epss","scoring_elements":"0.98751","published_at":"2026-05-05T12:55:00Z"},{"value":"0.71774","scoring_system":"epss","scoring_elements":"0.98753","published_at":"2026-05-07T12:55:00Z"},{"value":"0.71774","scoring_system":"epss","scoring_elements":"0.98755","published_at":"2026-05-09T12:55:00Z"},{"value":"0.71774","scoring_system":"epss","scoring_elements":"0.98756","published_at":"2026-05-11T12:55:00Z"},{"value":"0.71774","scoring_system":"epss","scoring_elements":"0.98758","published_at":"2026-05-12T12:55:00Z"},{"value":"0.72836","scoring_system":"epss","scoring_elements":"0.988","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183049","reference_id":"1183049","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183049"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/38641.rb","reference_id":"CVE-2014-6593;OSVDB-117238","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/38641.rb"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0067","reference_id":"RHSA-2015:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0068","reference_id":"RHSA-2015:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0085","reference_id":"RHSA-2015:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0133","reference_id":"RHSA-2015:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0134","reference_id":"RHSA-2015:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0135","reference_id":"RHSA-2015:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0136","reference_id":"RHSA-2015:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0263","reference_id":"RHSA-2015:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6593"],"risk_score":1.4,"exploitability":"2.0","weighted_severity":"0.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-753c-x7gd-37dd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40168?format=json","vulnerability_id":"VCID-8vgw-tt9y-rubw","summary":"Multiple vulnerabilities have been found in Oracle JRE/JDK,\n    allowing both local and remote attackers to compromise various Java\n    components.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0421.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0421.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0421","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29827","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29751","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29576","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2943","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29494","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29505","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29429","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2945","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3075","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30858","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30724","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30782","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30814","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30815","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30726","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00122","scoring_system":"epss","scoring_elements":"0.30859","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1184276","reference_id":"1184276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1184276"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0421"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8vgw-tt9y-rubw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40104?format=json","vulnerability_id":"VCID-98te-nhbx-qbb9","summary":"Multiple vulnerabilities have been found in Oracle JRE/JDK,\n    allowing both local and remote attackers to compromise various Java\n    components.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6549.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6549.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6549","reference_id":"","reference_type":"","scores":[{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76868","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76875","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76887","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76932","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76974","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76976","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.76968","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.77002","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.77008","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.77021","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.77012","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.77042","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.77062","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.77048","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00995","scoring_system":"epss","scoring_elements":"0.77065","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01071","scoring_system":"epss","scoring_elements":"0.77935","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6549"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183660","reference_id":"1183660","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183660"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0133","reference_id":"RHSA-2015:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0134","reference_id":"RHSA-2015:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0134"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6549"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-98te-nhbx-qbb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31273?format=json","vulnerability_id":"VCID-9xy4-pu4v-xuff","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0383.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0383","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21883","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21876","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21853","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21825","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21733","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21806","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23139","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23344","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23529","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24322","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24299","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2445","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24483","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24265","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24376","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24393","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24293","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24311","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1123870","reference_id":"1123870","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1123870"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0067","reference_id":"RHSA-2015:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0068","reference_id":"RHSA-2015:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0085","reference_id":"RHSA-2015:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0383"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9xy4-pu4v-xuff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31278?format=json","vulnerability_id":"VCID-ccht-tkj5-jfez","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0408.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0408.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0408","reference_id":"","reference_type":"","scores":[{"value":"0.07652","scoring_system":"epss","scoring_elements":"0.91853","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07652","scoring_system":"epss","scoring_elements":"0.91861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07652","scoring_system":"epss","scoring_elements":"0.91868","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07652","scoring_system":"epss","scoring_elements":"0.91875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07652","scoring_system":"epss","scoring_elements":"0.91887","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07652","scoring_system":"epss","scoring_elements":"0.91893","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07652","scoring_system":"epss","scoring_elements":"0.91896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07652","scoring_system":"epss","scoring_elements":"0.91892","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07652","scoring_system":"epss","scoring_elements":"0.91911","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07652","scoring_system":"epss","scoring_elements":"0.91908","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07652","scoring_system":"epss","scoring_elements":"0.91904","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07652","scoring_system":"epss","scoring_elements":"0.9191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.92766","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.92776","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.92788","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.928","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.92805","published_at":"2026-05-11T12:55:00Z"},{"value":"0.09309","scoring_system":"epss","scoring_elements":"0.92811","published_at":"2026-05-12T12:55:00Z"},{"value":"0.09938","scoring_system":"epss","scoring_elements":"0.93109","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183023","reference_id":"1183023","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183023"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0067","reference_id":"RHSA-2015:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0068","reference_id":"RHSA-2015:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0085","reference_id":"RHSA-2015:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0133","reference_id":"RHSA-2015:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0134","reference_id":"RHSA-2015:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0135","reference_id":"RHSA-2015:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0136","reference_id":"RHSA-2015:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0263","reference_id":"RHSA-2015:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0408"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ccht-tkj5-jfez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31268?format=json","vulnerability_id":"VCID-dr2n-9pz1-gfd5","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6585.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6585.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6585","reference_id":"","reference_type":"","scores":[{"value":"0.01314","scoring_system":"epss","scoring_elements":"0.80019","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01505","scoring_system":"epss","scoring_elements":"0.81253","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01505","scoring_system":"epss","scoring_elements":"0.81271","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01505","scoring_system":"epss","scoring_elements":"0.81237","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01505","scoring_system":"epss","scoring_elements":"0.81289","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01505","scoring_system":"epss","scoring_elements":"0.81307","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01505","scoring_system":"epss","scoring_elements":"0.81293","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85567","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85586","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85588","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85608","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85619","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85591","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85504","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85525","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85545","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.8557","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183645","reference_id":"1183645","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183645"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776264","reference_id":"776264","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776264"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0067","reference_id":"RHSA-2015:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0068","reference_id":"RHSA-2015:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0085","reference_id":"RHSA-2015:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0133","reference_id":"RHSA-2015:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0134","reference_id":"RHSA-2015:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0135","reference_id":"RHSA-2015:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0136","reference_id":"RHSA-2015:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0263","reference_id":"RHSA-2015:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"},{"reference_url":"https://usn.ubuntu.com/2522-1/","reference_id":"USN-2522-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2522-1/"},{"reference_url":"https://usn.ubuntu.com/2522-3/","reference_id":"USN-2522-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2522-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6585"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dr2n-9pz1-gfd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31277?format=json","vulnerability_id":"VCID-edhe-xduh-8fb9","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0407.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0407.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0407","reference_id":"","reference_type":"","scores":[{"value":"0.01927","scoring_system":"epss","scoring_elements":"0.83564","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02204","scoring_system":"epss","scoring_elements":"0.84522","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02204","scoring_system":"epss","scoring_elements":"0.84549","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02204","scoring_system":"epss","scoring_elements":"0.84504","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02204","scoring_system":"epss","scoring_elements":"0.84563","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02204","scoring_system":"epss","scoring_elements":"0.8458","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02204","scoring_system":"epss","scoring_elements":"0.84565","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86323","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86319","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86334","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86255","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86333","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86353","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86363","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86339","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86282","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86301","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86311","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02893","scoring_system":"epss","scoring_elements":"0.86325","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183043","reference_id":"1183043","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183043"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0067","reference_id":"RHSA-2015:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0068","reference_id":"RHSA-2015:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0085","reference_id":"RHSA-2015:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0133","reference_id":"RHSA-2015:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0134","reference_id":"RHSA-2015:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0135","reference_id":"RHSA-2015:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0136","reference_id":"RHSA-2015:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0263","reference_id":"RHSA-2015:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0407"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-edhe-xduh-8fb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40158?format=json","vulnerability_id":"VCID-f46c-z1vt-jkae","summary":"Multiple vulnerabilities have been found in Oracle JRE/JDK,\n    allowing both local and remote attackers to compromise various Java\n    components.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0410.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0410.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0410","reference_id":"","reference_type":"","scores":[{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90143","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90146","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90157","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90163","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90178","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90192","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90204","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90205","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90201","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90215","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05455","scoring_system":"epss","scoring_elements":"0.90214","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05601","scoring_system":"epss","scoring_elements":"0.904","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0636","scoring_system":"epss","scoring_elements":"0.91049","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0636","scoring_system":"epss","scoring_elements":"0.91063","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0636","scoring_system":"epss","scoring_elements":"0.91033","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0636","scoring_system":"epss","scoring_elements":"0.91075","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0636","scoring_system":"epss","scoring_elements":"0.91084","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0636","scoring_system":"epss","scoring_elements":"0.91077","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183044","reference_id":"1183044","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183044"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0067","reference_id":"RHSA-2015:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0068","reference_id":"RHSA-2015:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0085","reference_id":"RHSA-2015:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0133","reference_id":"RHSA-2015:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0134","reference_id":"RHSA-2015:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0135","reference_id":"RHSA-2015:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0136","reference_id":"RHSA-2015:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0263","reference_id":"RHSA-2015:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0410"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f46c-z1vt-jkae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31270?format=json","vulnerability_id":"VCID-nyhx-9tes-9ygr","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6591.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6591.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6591","reference_id":"","reference_type":"","scores":[{"value":"0.01555","scoring_system":"epss","scoring_elements":"0.81628","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0178","scoring_system":"epss","scoring_elements":"0.82794","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0178","scoring_system":"epss","scoring_elements":"0.82815","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0178","scoring_system":"epss","scoring_elements":"0.82775","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0178","scoring_system":"epss","scoring_elements":"0.82835","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0178","scoring_system":"epss","scoring_elements":"0.8285","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0178","scoring_system":"epss","scoring_elements":"0.82836","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84775","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.8477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84791","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84697","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84817","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84827","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84793","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84733","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84755","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.84762","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02311","scoring_system":"epss","scoring_elements":"0.8478","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183646","reference_id":"1183646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183646"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775884","reference_id":"775884","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775884"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0067","reference_id":"RHSA-2015:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0068","reference_id":"RHSA-2015:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0085","reference_id":"RHSA-2015:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0133","reference_id":"RHSA-2015:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0134","reference_id":"RHSA-2015:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0135","reference_id":"RHSA-2015:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0136","reference_id":"RHSA-2015:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0263","reference_id":"RHSA-2015:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"},{"reference_url":"https://usn.ubuntu.com/2522-1/","reference_id":"USN-2522-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2522-1/"},{"reference_url":"https://usn.ubuntu.com/2522-3/","reference_id":"USN-2522-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2522-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6591"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nyhx-9tes-9ygr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31272?format=json","vulnerability_id":"VCID-vath-gcc5-zybq","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6601.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6601","reference_id":"","reference_type":"","scores":[{"value":"0.13255","scoring_system":"epss","scoring_elements":"0.94112","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13255","scoring_system":"epss","scoring_elements":"0.94122","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13255","scoring_system":"epss","scoring_elements":"0.94134","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13255","scoring_system":"epss","scoring_elements":"0.94137","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13255","scoring_system":"epss","scoring_elements":"0.94146","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13255","scoring_system":"epss","scoring_elements":"0.94149","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13255","scoring_system":"epss","scoring_elements":"0.94154","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13255","scoring_system":"epss","scoring_elements":"0.9417","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13255","scoring_system":"epss","scoring_elements":"0.94174","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13255","scoring_system":"epss","scoring_elements":"0.94176","published_at":"2026-04-26T12:55:00Z"},{"value":"0.15867","scoring_system":"epss","scoring_elements":"0.94766","published_at":"2026-04-29T12:55:00Z"},{"value":"0.15867","scoring_system":"epss","scoring_elements":"0.94774","published_at":"2026-05-05T12:55:00Z"},{"value":"0.15867","scoring_system":"epss","scoring_elements":"0.94782","published_at":"2026-05-07T12:55:00Z"},{"value":"0.15867","scoring_system":"epss","scoring_elements":"0.94791","published_at":"2026-05-09T12:55:00Z"},{"value":"0.15867","scoring_system":"epss","scoring_elements":"0.94798","published_at":"2026-05-11T12:55:00Z"},{"value":"0.15867","scoring_system":"epss","scoring_elements":"0.94803","published_at":"2026-05-12T12:55:00Z"},{"value":"0.16838","scoring_system":"epss","scoring_elements":"0.95016","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183020","reference_id":"1183020","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183020"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0067","reference_id":"RHSA-2015:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0068","reference_id":"RHSA-2015:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0085","reference_id":"RHSA-2015:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6601"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vath-gcc5-zybq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31269?format=json","vulnerability_id":"VCID-vuvu-hscm-guh1","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6587.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6587.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6587","reference_id":"","reference_type":"","scores":[{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31824","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31677","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31751","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31759","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31666","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31689","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.3439","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.3435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34327","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34362","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34349","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34309","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.3394","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34085","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34421","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34449","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34315","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34358","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34387","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.3547","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183715","reference_id":"1183715","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183715"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0067","reference_id":"RHSA-2015:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0068","reference_id":"RHSA-2015:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0085","reference_id":"RHSA-2015:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0133","reference_id":"RHSA-2015:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0134","reference_id":"RHSA-2015:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0135","reference_id":"RHSA-2015:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0263","reference_id":"RHSA-2015:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2014-6587"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vuvu-hscm-guh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31275?format=json","vulnerability_id":"VCID-wy3y-qjfn-xudt","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0395.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0395.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0395","reference_id":"","reference_type":"","scores":[{"value":"0.16241","scoring_system":"epss","scoring_elements":"0.94835","published_at":"2026-04-21T12:55:00Z"},{"value":"0.16241","scoring_system":"epss","scoring_elements":"0.94837","published_at":"2026-04-24T12:55:00Z"},{"value":"0.16241","scoring_system":"epss","scoring_elements":"0.94838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.19281","scoring_system":"epss","scoring_elements":"0.95384","published_at":"2026-04-29T12:55:00Z"},{"value":"0.19281","scoring_system":"epss","scoring_elements":"0.95393","published_at":"2026-05-05T12:55:00Z"},{"value":"0.19281","scoring_system":"epss","scoring_elements":"0.954","published_at":"2026-05-07T12:55:00Z"},{"value":"0.19281","scoring_system":"epss","scoring_elements":"0.95408","published_at":"2026-05-09T12:55:00Z"},{"value":"0.19281","scoring_system":"epss","scoring_elements":"0.95414","published_at":"2026-05-11T12:55:00Z"},{"value":"0.19281","scoring_system":"epss","scoring_elements":"0.95418","published_at":"2026-05-12T12:55:00Z"},{"value":"0.19708","scoring_system":"epss","scoring_elements":"0.95444","published_at":"2026-04-18T12:55:00Z"},{"value":"0.19708","scoring_system":"epss","scoring_elements":"0.95398","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19708","scoring_system":"epss","scoring_elements":"0.95407","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19708","scoring_system":"epss","scoring_elements":"0.95413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19708","scoring_system":"epss","scoring_elements":"0.95417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19708","scoring_system":"epss","scoring_elements":"0.95423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19708","scoring_system":"epss","scoring_elements":"0.95426","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19708","scoring_system":"epss","scoring_elements":"0.9543","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19708","scoring_system":"epss","scoring_elements":"0.95432","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19708","scoring_system":"epss","scoring_elements":"0.9544","published_at":"2026-04-16T12:55:00Z"},{"value":"0.204","scoring_system":"epss","scoring_elements":"0.95605","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183031","reference_id":"1183031","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183031"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0067","reference_id":"RHSA-2015:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0068","reference_id":"RHSA-2015:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0085","reference_id":"RHSA-2015:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0135","reference_id":"RHSA-2015:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0136","reference_id":"RHSA-2015:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0263","reference_id":"RHSA-2015:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0395"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wy3y-qjfn-xudt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31279?format=json","vulnerability_id":"VCID-xgvx-tpbg-73hf","summary":"Multiple vulnerabilities have been found in IcedTea allowing remote\n    attackers to affect confidentiality, integrity, and availability through\n    various vectors.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0412.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0412","reference_id":"","reference_type":"","scores":[{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80695","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80704","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80725","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80722","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.8075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80759","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.8076","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80751","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80789","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.8079","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80813","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01447","scoring_system":"epss","scoring_elements":"0.80818","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01718","scoring_system":"epss","scoring_elements":"0.82463","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01718","scoring_system":"epss","scoring_elements":"0.82482","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01718","scoring_system":"epss","scoring_elements":"0.82503","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01718","scoring_system":"epss","scoring_elements":"0.82524","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01718","scoring_system":"epss","scoring_elements":"0.82522","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01718","scoring_system":"epss","scoring_elements":"0.82538","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01848","scoring_system":"epss","scoring_elements":"0.83183","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183021","reference_id":"1183021","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183021"},{"reference_url":"https://security.gentoo.org/glsa/201507-14","reference_id":"GLSA-201507-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201507-14"},{"reference_url":"https://security.gentoo.org/glsa/201603-14","reference_id":"GLSA-201603-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0067","reference_id":"RHSA-2015:0067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0068","reference_id":"RHSA-2015:0068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0079","reference_id":"RHSA-2015:0079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0079"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0085","reference_id":"RHSA-2015:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0086","reference_id":"RHSA-2015:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0133","reference_id":"RHSA-2015:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0134","reference_id":"RHSA-2015:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0135","reference_id":"RHSA-2015:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0263","reference_id":"RHSA-2015:0263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0263"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"},{"reference_url":"https://usn.ubuntu.com/2486-1/","reference_id":"USN-2486-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2486-1/"},{"reference_url":"https://usn.ubuntu.com/2487-1/","reference_id":"USN-2487-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2487-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"}],"aliases":["CVE-2015-0412"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xgvx-tpbg-73hf"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"}