{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34714?format=json","vulnerability_id":"VCID-42p6-1tu2-pybt","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.","aliases":[{"alias":"CVE-2015-0437"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933675?format=json","purl":"pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/933671?format=json","purl":"pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1108341?format=json","purl":"pkg:deb/debian/openjdk-8@8u492-ga-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u492-ga-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/73836?format=json","purl":"pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jdk-bin@1.8.0.72"},{"url":"http://public2.vulnerablecode.io/api/packages/73835?format=json","purl":"pkg:ebuild/dev-java/oracle-jre-bin@1.8.0.72","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/oracle-jre-bin@1.8.0.72"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/120423?format=json","purl":"pkg:rpm/redhat/java-1.8.0-openjdk@1:1.8.0.31-1.b13?arch=el6_6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-42p6-1tu2-pybt"},{"vulnerability":"VCID-753c-x7gd-37dd"},{"vulnerability":"VCID-98te-nhbx-qbb9"},{"vulnerability":"VCID-9xy4-pu4v-xuff"},{"vulnerability":"VCID-ccht-tkj5-jfez"},{"vulnerability":"VCID-dr2n-9pz1-gfd5"},{"vulnerability":"VCID-edhe-xduh-8fb9"},{"vulnerability":"VCID-f46c-z1vt-jkae"},{"vulnerability":"VCID-nyhx-9tes-9ygr"},{"vulnerability":"VCID-vath-gcc5-zybq"},{"vulnerability":"VCID-vuvu-hscm-guh1"},{"vulnerability":"VCID-wy3y-qjfn-xudt"},{"vulnerability":"VCID-xap5-djda-2uem"},{"vulnerability":"VCID-xgvx-tpbg-73hf"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-openjdk@1:1.8.0.31-1.b13%3Farch=el6_6"},{"url":"http://public2.vulnerablecode.io/api/packages/120428?format=json","purl":"pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.31-1jpp.1?arch=el6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-42p6-1tu2-pybt"},{"vulnerability":"VCID-6q6b-qa23-dyge"},{"vulnerability":"VCID-753c-x7gd-37dd"},{"vulnerability":"VCID-8vgw-tt9y-rubw"},{"vulnerability":"VCID-98te-nhbx-qbb9"},{"vulnerability":"VCID-9xy4-pu4v-xuff"},{"vulnerability":"VCID-ccht-tkj5-jfez"},{"vulnerability":"VCID-dr2n-9pz1-gfd5"},{"vulnerability":"VCID-edhe-xduh-8fb9"},{"vulnerability":"VCID-f46c-z1vt-jkae"},{"vulnerability":"VCID-ntmk-ub1c-5ygz"},{"vulnerability":"VCID-nyhx-9tes-9ygr"},{"vulnerability":"VCID-vath-gcc5-zybq"},{"vulnerability":"VCID-vuvu-hscm-guh1"},{"vulnerability":"VCID-wy3y-qjfn-xudt"},{"vulnerability":"VCID-xap5-djda-2uem"},{"vulnerability":"VCID-xgvx-tpbg-73hf"},{"vulnerability":"VCID-xry5-hzk4-b3b8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.31-1jpp.1%3Farch=el6"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0437.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0437.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0437","reference_id":"","reference_type":"","scores":[{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76818","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76893","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76905","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76888","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76858","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76868","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76849","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77829","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77807","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01057","scoring_system":"epss","scoring_elements":"0.77821","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79145","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.7917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79146","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79128","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79101","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79169","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01228","scoring_system":"epss","scoring_elements":"0.79172","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0437"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183670","reference_id":"1183670","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183670"},{"reference_url":"https://security.gentoo.org/glsa/201603-11","reference_id":"GLSA-201603-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0069","reference_id":"RHSA-2015:0069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0080","reference_id":"RHSA-2015:0080","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0080"}],"weaknesses":[],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.0","risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-42p6-1tu2-pybt"}