{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37731?format=json","vulnerability_id":"VCID-ybjz-2xqf-2ub1","summary":"BEA JRockit contains several vulnerabilities, some of which may allow the\n    execution of arbitrary code.","aliases":[{"alias":"CVE-2007-3922"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74696?format=json","purl":"pkg:ebuild/dev-java/jrockit-jdk-bin@1.5.0.11_p1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/jrockit-jdk-bin@1.5.0.11_p1"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/129685?format=json","purl":"pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.5-1jpp.0.1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3fbs-tg62-affp"},{"vulnerability":"VCID-d5e5-vaa8-wbdr"},{"vulnerability":"VCID-ea5j-wj8f-tkfj"},{"vulnerability":"VCID-qhun-34fa-xygm"},{"vulnerability":"VCID-s828-4jhd-3be6"},{"vulnerability":"VCID-sxc2-qmst-kub2"},{"vulnerability":"VCID-ybjz-2xqf-2ub1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.5-1jpp.0.1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/129682?format=json","purl":"pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.5-1jpp.2?arch=el4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3fbs-tg62-affp"},{"vulnerability":"VCID-d5e5-vaa8-wbdr"},{"vulnerability":"VCID-ea5j-wj8f-tkfj"},{"vulnerability":"VCID-qhun-34fa-xygm"},{"vulnerability":"VCID-s828-4jhd-3be6"},{"vulnerability":"VCID-sxc2-qmst-kub2"},{"vulnerability":"VCID-ybjz-2xqf-2ub1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.5-1jpp.2%3Farch=el4"},{"url":"http://public2.vulnerablecode.io/api/packages/129744?format=json","purl":"pkg:rpm/redhat/java-1.5.0-sun@1.5.0.12-1jpp.2?arch=el4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-ea5j-wj8f-tkfj"},{"vulnerability":"VCID-sxc2-qmst-kub2"},{"vulnerability":"VCID-ybjz-2xqf-2ub1"},{"vulnerability":"VCID-yugs-rwuf-q7gh"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-sun@1.5.0.12-1jpp.2%3Farch=el4"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3922.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3922.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3922","reference_id":"","reference_type":"","scores":[{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88599","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88608","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88624","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88626","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88649","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88654","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88667","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88663","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88676","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88682","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04136","scoring_system":"epss","scoring_elements":"0.88681","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89809","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89824","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89835","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.8983","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89839","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05048","scoring_system":"epss","scoring_elements":"0.89855","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3922"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=249533","reference_id":"249533","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=249533"},{"reference_url":"https://security.gentoo.org/glsa/200709-15","reference_id":"GLSA-200709-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200709-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0818","reference_id":"RHSA-2007:0818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0829","reference_id":"RHSA-2007:0829","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0133","reference_id":"RHSA-2008:0133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0133"}],"weaknesses":[],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.0","risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ybjz-2xqf-2ub1"}