Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-71j7-fgmc-9ygm
Summary
Multiple vulnerabilities have been found in the IcedTea JDK, the
    worst of which could lead to arbitrary code execution.
Aliases
0
alias CVE-2011-0025
Fixed_packages
0
url pkg:ebuild/dev-java/icedtea-bin@6.1.13.3
purl pkg:ebuild/dev-java/icedtea-bin@6.1.13.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@6.1.13.3
Affected_packages
0
url pkg:ebuild/dev-java/icedtea-bin@6
purl pkg:ebuild/dev-java/icedtea-bin@6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-14yk-ezmb-hfet
1
vulnerability VCID-15qm-fyc8-f3da
2
vulnerability VCID-17nn-wrs1-fkb6
3
vulnerability VCID-1m2k-jt6j-kyam
4
vulnerability VCID-1m3h-7qcm-rbfb
5
vulnerability VCID-1r7j-ntmu-pfft
6
vulnerability VCID-1yyz-wmtf-n7af
7
vulnerability VCID-25t1-bm52-vfdf
8
vulnerability VCID-2fdb-zr4u-juga
9
vulnerability VCID-2fzv-2u6c-eyf8
10
vulnerability VCID-2g73-94ue-wbac
11
vulnerability VCID-2gme-zs8y-bqec
12
vulnerability VCID-2jj1-ebr5-5bbj
13
vulnerability VCID-2n55-tkzw-g7b9
14
vulnerability VCID-2nc7-hgsm-9yd7
15
vulnerability VCID-2uc7-aypy-jkde
16
vulnerability VCID-2udw-8wht-fbgt
17
vulnerability VCID-2uzz-8f2r-yke6
18
vulnerability VCID-3cf3-4nbu-8ugb
19
vulnerability VCID-3dse-wv2n-suhm
20
vulnerability VCID-3ehy-szsm-qqcd
21
vulnerability VCID-3kpz-hath-rkbu
22
vulnerability VCID-3pmx-vxa8-nbcb
23
vulnerability VCID-3qa8-r3be-tba7
24
vulnerability VCID-3zd7-1c2k-6bf6
25
vulnerability VCID-4142-6bvd-ryfh
26
vulnerability VCID-48md-gspa-h3ax
27
vulnerability VCID-4arp-hkg6-w7hd
28
vulnerability VCID-4g9p-kms6-33fy
29
vulnerability VCID-4p3u-gdhr-jucj
30
vulnerability VCID-4qsk-zyhg-a3dq
31
vulnerability VCID-5396-g8m1-y3cq
32
vulnerability VCID-5a95-kbje-y3hp
33
vulnerability VCID-5g76-sgm3-5qgy
34
vulnerability VCID-5mff-qcs4-1qeu
35
vulnerability VCID-5u17-kgsw-akar
36
vulnerability VCID-5wx8-nzpy-kfhg
37
vulnerability VCID-6573-arns-dubp
38
vulnerability VCID-67w9-dry7-ybcx
39
vulnerability VCID-6d27-47wg-v7a2
40
vulnerability VCID-6dhw-uqtb-kua5
41
vulnerability VCID-6f4g-2v9h-e3d2
42
vulnerability VCID-6mtv-ft8u-q3c6
43
vulnerability VCID-6q4h-4h6p-nufq
44
vulnerability VCID-6qse-ddhe-f7ea
45
vulnerability VCID-6wcf-8jg2-2yex
46
vulnerability VCID-6y1r-9shn-abdp
47
vulnerability VCID-71j7-fgmc-9ygm
48
vulnerability VCID-753c-x7gd-37dd
49
vulnerability VCID-76k9-jkjs-h3b6
50
vulnerability VCID-76wu-nfc9-ebb5
51
vulnerability VCID-7cvu-7n2n-yfcd
52
vulnerability VCID-7dwd-t56z-nyga
53
vulnerability VCID-7nfj-4kye-bqd1
54
vulnerability VCID-7pdn-vqkz-m3bf
55
vulnerability VCID-7rua-9gwq-pkcu
56
vulnerability VCID-7w4t-zbpu-ryds
57
vulnerability VCID-7y2q-c6xs-nbex
58
vulnerability VCID-82f8-r9qy-a3a9
59
vulnerability VCID-831v-7kmc-aucv
60
vulnerability VCID-85a2-7xgd-sydv
61
vulnerability VCID-865x-zdpg-vbfb
62
vulnerability VCID-87f2-a1zb-7qgp
63
vulnerability VCID-8faz-85u1-zbeq
64
vulnerability VCID-8h5u-kf61-nkbg
65
vulnerability VCID-8jtg-kntk-zuhp
66
vulnerability VCID-8nr2-vwxr-17bx
67
vulnerability VCID-8s7r-edj6-wyeq
68
vulnerability VCID-96cv-7mvp-kyfn
69
vulnerability VCID-98s6-fdp7-gkg6
70
vulnerability VCID-9b24-nsw7-yyfx
71
vulnerability VCID-9efe-yne6-pbct
72
vulnerability VCID-9hpn-u1y1-9bdf
73
vulnerability VCID-9n7g-864v-hufw
74
vulnerability VCID-9np5-mkt9-tke6
75
vulnerability VCID-9wuu-5sx8-kqas
76
vulnerability VCID-9xy4-pu4v-xuff
77
vulnerability VCID-9y8q-cnzk-fyht
78
vulnerability VCID-a21v-fxys-5khy
79
vulnerability VCID-a326-kbt5-h7bp
80
vulnerability VCID-a6wc-3mp6-63ek
81
vulnerability VCID-a7qr-dzhg-qbbq
82
vulnerability VCID-ajy9-yfsa-5bc5
83
vulnerability VCID-amqp-krc8-mkc7
84
vulnerability VCID-ands-9hzf-1qgk
85
vulnerability VCID-au4s-5j9w-nybx
86
vulnerability VCID-b1m6-r1bv-d7gr
87
vulnerability VCID-b9wa-u375-xuef
88
vulnerability VCID-bkcn-7xu6-g7at
89
vulnerability VCID-bkf4-nqbw-13be
90
vulnerability VCID-bmqy-5rm7-pqhx
91
vulnerability VCID-bnn4-y7cn-7kd4
92
vulnerability VCID-bqxe-tpzn-dygb
93
vulnerability VCID-c2yd-ygs1-1uaf
94
vulnerability VCID-c2zx-s8vs-fbgp
95
vulnerability VCID-c9ga-jwuz-9qcs
96
vulnerability VCID-camp-gyaa-2qf4
97
vulnerability VCID-cb52-8wmv-h3cp
98
vulnerability VCID-ccht-tkj5-jfez
99
vulnerability VCID-cf31-qyvb-pyem
100
vulnerability VCID-cqv9-h7xq-hqcd
101
vulnerability VCID-cu4d-hpxb-4kcs
102
vulnerability VCID-cvuc-vk1m-p7eh
103
vulnerability VCID-cwm3-jvbw-pycs
104
vulnerability VCID-db2p-gyj9-5fh2
105
vulnerability VCID-dfgc-ykg1-wfcp
106
vulnerability VCID-dfrc-cgad-9bft
107
vulnerability VCID-dghq-cq9k-9kan
108
vulnerability VCID-dnjn-pxun-p7c5
109
vulnerability VCID-dr2n-9pz1-gfd5
110
vulnerability VCID-ds2p-83xe-dfdm
111
vulnerability VCID-dt9f-ns4h-judb
112
vulnerability VCID-dxv7-9y1b-pff7
113
vulnerability VCID-dyt1-cndg-7fds
114
vulnerability VCID-dzaq-rw8t-wqba
115
vulnerability VCID-e1yx-dxa6-1bba
116
vulnerability VCID-e4dr-2bah-k7bp
117
vulnerability VCID-e62p-4szd-3ubj
118
vulnerability VCID-e8zs-h9pn-5qhm
119
vulnerability VCID-eav9-k1cf-8uaq
120
vulnerability VCID-edhe-xduh-8fb9
121
vulnerability VCID-erxc-qxay-ayhr
122
vulnerability VCID-eu81-714z-1yeq
123
vulnerability VCID-evb5-19yd-dyep
124
vulnerability VCID-f1vn-re8k-gqb4
125
vulnerability VCID-f2zj-pup6-x3a3
126
vulnerability VCID-f4d5-mkub-b3e1
127
vulnerability VCID-fbds-ed54-xufq
128
vulnerability VCID-fc7q-fpp2-7yfy
129
vulnerability VCID-fftg-8wp1-bqdy
130
vulnerability VCID-fkxb-595t-cbex
131
vulnerability VCID-fr3v-tdqc-y3d7
132
vulnerability VCID-ftff-7h3z-yyg5
133
vulnerability VCID-gagr-4wpm-uye5
134
vulnerability VCID-gftp-xpk4-g7ew
135
vulnerability VCID-gted-bme5-r7gf
136
vulnerability VCID-h14x-y4n6-skem
137
vulnerability VCID-had5-3tnv-k3hm
138
vulnerability VCID-hff9-wv9j-ffh9
139
vulnerability VCID-hfru-xr8y-efcs
140
vulnerability VCID-j35a-btuq-83hs
141
vulnerability VCID-j4dz-vj7k-jugu
142
vulnerability VCID-j9w1-znfd-ubh1
143
vulnerability VCID-j9z8-5zpv-8bhy
144
vulnerability VCID-jau7-gfz8-dkfa
145
vulnerability VCID-jj9j-kwv8-byba
146
vulnerability VCID-jpam-uapv-tfch
147
vulnerability VCID-jrxs-q15y-pudg
148
vulnerability VCID-jsar-ckqj-67ew
149
vulnerability VCID-jt92-wb33-k3bs
150
vulnerability VCID-jwhg-5nwu-yfb5
151
vulnerability VCID-jwjm-hptr-a3hy
152
vulnerability VCID-jwpp-qr3e-ffgn
153
vulnerability VCID-k4uz-574m-aqd3
154
vulnerability VCID-kahp-6ybn-9yax
155
vulnerability VCID-kct4-fj4c-7kgv
156
vulnerability VCID-khuw-dsag-p7ey
157
vulnerability VCID-kkh1-7ery-8ugq
158
vulnerability VCID-kn39-nd68-a7c8
159
vulnerability VCID-knv6-1uv9-yfcy
160
vulnerability VCID-ks2a-sb7b-6yb7
161
vulnerability VCID-ksn8-e1kf-bucg
162
vulnerability VCID-kwu7-a77q-2fea
163
vulnerability VCID-m2d2-shze-ybgs
164
vulnerability VCID-mebk-ymrs-wkd2
165
vulnerability VCID-mmcx-4heu-dbdh
166
vulnerability VCID-mmrp-aqn2-nkd1
167
vulnerability VCID-mqdc-3qdf-efhs
168
vulnerability VCID-msup-sd1d-j3b8
169
vulnerability VCID-muqs-gqsv-wuev
170
vulnerability VCID-mv29-w9jk-vybs
171
vulnerability VCID-n6gc-cnsc-z7a6
172
vulnerability VCID-n7ju-v5t7-h3eq
173
vulnerability VCID-ncb3-763z-tfak
174
vulnerability VCID-nd4r-zsay-xycv
175
vulnerability VCID-ngcv-sjuw-23hu
176
vulnerability VCID-nj59-1wrw-kbd1
177
vulnerability VCID-nucv-r9w9-4yc5
178
vulnerability VCID-nv52-jzcr-37ay
179
vulnerability VCID-nyf1-5f2w-q3g1
180
vulnerability VCID-nyhx-9tes-9ygr
181
vulnerability VCID-p127-f7pc-gfen
182
vulnerability VCID-p9m1-4uhu-7kfh
183
vulnerability VCID-pbdx-8nxr-nbew
184
vulnerability VCID-pe1n-mzny-93ek
185
vulnerability VCID-pf5g-cuwm-7bey
186
vulnerability VCID-ppc6-sk8a-ebf6
187
vulnerability VCID-prnm-yq7v-gbdv
188
vulnerability VCID-pshs-rsdz-cufm
189
vulnerability VCID-pvtc-vwz8-wfdg
190
vulnerability VCID-q12q-umtv-pyb4
191
vulnerability VCID-q5c8-hwra-zyfr
192
vulnerability VCID-q7ua-vcgd-q7e6
193
vulnerability VCID-q8r7-cndd-v3ap
194
vulnerability VCID-q9dd-2y4c-1fgc
195
vulnerability VCID-qb3m-qxb4-vydk
196
vulnerability VCID-qb56-zfz8-4bev
197
vulnerability VCID-qfw9-f3rm-kfah
198
vulnerability VCID-qmvf-8y88-gqhh
199
vulnerability VCID-qn9t-vaqg-tkf8
200
vulnerability VCID-qr8g-acpq-pqfc
201
vulnerability VCID-qskx-yp83-dufy
202
vulnerability VCID-qswt-y34k-5kc8
203
vulnerability VCID-qt82-aw67-tqhk
204
vulnerability VCID-r3tj-qpxn-dya5
205
vulnerability VCID-r691-77bt-skhe
206
vulnerability VCID-r992-zpw8-hke2
207
vulnerability VCID-rf3h-5anf-jkdy
208
vulnerability VCID-rfp8-t93a-2qa4
209
vulnerability VCID-rn74-ggyj-mkf3
210
vulnerability VCID-rp28-xxta-67gr
211
vulnerability VCID-rrdj-ssn7-zfdj
212
vulnerability VCID-rxz6-u57e-jqdf
213
vulnerability VCID-rypa-d47y-q3a6
214
vulnerability VCID-s73e-gcn1-77hr
215
vulnerability VCID-s9hj-8yru-hyd7
216
vulnerability VCID-sk3j-q3uf-5yfp
217
vulnerability VCID-skq8-j6yq-1bgq
218
vulnerability VCID-skvx-a4ep-sufh
219
vulnerability VCID-smhf-tqrh-1bam
220
vulnerability VCID-sn49-t5fd-u3hc
221
vulnerability VCID-t1yx-brps-4yhe
222
vulnerability VCID-t653-gwcf-4bfp
223
vulnerability VCID-t6qx-k3n7-a7en
224
vulnerability VCID-t7b6-9vnd-6be1
225
vulnerability VCID-tc7a-29c8-b3dx
226
vulnerability VCID-tft2-nbge-kya2
227
vulnerability VCID-tmtc-dkqf-p3ap
228
vulnerability VCID-tr2q-ye8m-8ke7
229
vulnerability VCID-tt7k-yzuf-9bc4
230
vulnerability VCID-twh8-87va-juf9
231
vulnerability VCID-u5jr-jf83-gbbb
232
vulnerability VCID-uaur-z1tw-v7gk
233
vulnerability VCID-ug4j-yfam-zqa9
234
vulnerability VCID-uq19-1f86-cqgk
235
vulnerability VCID-uu8k-h28e-wygf
236
vulnerability VCID-uud1-wmsy-r3fd
237
vulnerability VCID-uvbz-c5pd-a3hc
238
vulnerability VCID-uvxw-46pp-fyaj
239
vulnerability VCID-uwxq-bbum-1yhw
240
vulnerability VCID-v2e9-45y6-8qd4
241
vulnerability VCID-vath-gcc5-zybq
242
vulnerability VCID-vd1b-gxgh-kyg9
243
vulnerability VCID-vf65-ugfc-nueg
244
vulnerability VCID-vr7q-u9qz-hua5
245
vulnerability VCID-vrm5-g1d9-ufey
246
vulnerability VCID-vuvu-hscm-guh1
247
vulnerability VCID-w2fp-p4vj-q3ar
248
vulnerability VCID-wbup-e69y-3fgh
249
vulnerability VCID-we8p-qdzs-wub4
250
vulnerability VCID-wfkg-16pe-wba2
251
vulnerability VCID-wkkv-61uc-jufm
252
vulnerability VCID-wqcq-rktw-jyct
253
vulnerability VCID-wy3y-qjfn-xudt
254
vulnerability VCID-x72p-yry2-bugs
255
vulnerability VCID-xgvx-tpbg-73hf
256
vulnerability VCID-xtbz-97wf-hudp
257
vulnerability VCID-y121-2nk3-pqf5
258
vulnerability VCID-y21s-gezt-bfeq
259
vulnerability VCID-y85b-vf43-1bfz
260
vulnerability VCID-y93w-et8f-8bgr
261
vulnerability VCID-ykt4-n3sx-v3cd
262
vulnerability VCID-ynn9-thtp-wkbh
263
vulnerability VCID-ys2q-r978-c3gf
264
vulnerability VCID-yvbv-c7hx-aqah
265
vulnerability VCID-yy8m-5wp3-tbby
266
vulnerability VCID-yyav-75eb-e3av
267
vulnerability VCID-z63k-wes3-gqgw
268
vulnerability VCID-z8sf-9vvx-uqea
269
vulnerability VCID-ze38-fyef-wbcr
270
vulnerability VCID-zed9-s11h-f3bz
271
vulnerability VCID-zp2x-b1fa-jqe3
272
vulnerability VCID-ztyf-ukmt-63b3
273
vulnerability VCID-zvmd-6wrn-jkcr
274
vulnerability VCID-zzzw-t6t2-qqft
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-java/icedtea-bin@6
References
0
reference_url http://blog.fuseyism.com/index.php/2011/02/01/security-icedtea6-178-185-195-released/
reference_id
reference_type
scores
url http://blog.fuseyism.com/index.php/2011/02/01/security-icedtea6-178-185-195-released/
1
reference_url http://icedtea.classpath.org/hg/release/icedtea-web-1.0?cmd=changeset%3Bnode=3bd328e4b515
reference_id
reference_type
scores
url http://icedtea.classpath.org/hg/release/icedtea-web-1.0?cmd=changeset%3Bnode=3bd328e4b515
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0025.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0025.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0025
reference_id
reference_type
scores
0
value 0.0154
scoring_system epss
scoring_elements 0.81546
published_at 2026-05-14T12:55:00Z
1
value 0.0154
scoring_system epss
scoring_elements 0.81301
published_at 2026-04-01T12:55:00Z
2
value 0.0154
scoring_system epss
scoring_elements 0.8131
published_at 2026-04-02T12:55:00Z
3
value 0.0154
scoring_system epss
scoring_elements 0.81332
published_at 2026-04-04T12:55:00Z
4
value 0.0154
scoring_system epss
scoring_elements 0.81331
published_at 2026-04-07T12:55:00Z
5
value 0.0154
scoring_system epss
scoring_elements 0.8136
published_at 2026-04-08T12:55:00Z
6
value 0.0154
scoring_system epss
scoring_elements 0.81365
published_at 2026-04-09T12:55:00Z
7
value 0.0154
scoring_system epss
scoring_elements 0.81386
published_at 2026-04-11T12:55:00Z
8
value 0.0154
scoring_system epss
scoring_elements 0.81371
published_at 2026-04-12T12:55:00Z
9
value 0.0154
scoring_system epss
scoring_elements 0.81363
published_at 2026-04-13T12:55:00Z
10
value 0.0154
scoring_system epss
scoring_elements 0.81401
published_at 2026-04-21T12:55:00Z
11
value 0.0154
scoring_system epss
scoring_elements 0.81424
published_at 2026-04-24T12:55:00Z
12
value 0.0154
scoring_system epss
scoring_elements 0.81431
published_at 2026-04-26T12:55:00Z
13
value 0.0154
scoring_system epss
scoring_elements 0.81435
published_at 2026-04-29T12:55:00Z
14
value 0.0154
scoring_system epss
scoring_elements 0.81452
published_at 2026-05-05T12:55:00Z
15
value 0.0154
scoring_system epss
scoring_elements 0.81472
published_at 2026-05-07T12:55:00Z
16
value 0.0154
scoring_system epss
scoring_elements 0.81493
published_at 2026-05-09T12:55:00Z
17
value 0.0154
scoring_system epss
scoring_elements 0.81489
published_at 2026-05-11T12:55:00Z
18
value 0.0154
scoring_system epss
scoring_elements 0.81507
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0025
4
reference_url http://secunia.com/advisories/43135
reference_id
reference_type
scores
url http://secunia.com/advisories/43135
5
reference_url http://security.gentoo.org/glsa/glsa-201406-32.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201406-32.xml
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65151
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65151
7
reference_url http://www.debian.org/security/2011/dsa-2224
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2224
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:054
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:054
9
reference_url http://www.securityfocus.com/bid/46110
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46110
10
reference_url http://www.ubuntu.com/usn/USN-1055-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1055-1
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=672262
reference_id 672262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=672262
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.5:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.7.7:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.8:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.8.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.8.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.8.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.8.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.9:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.9.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.9.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.9.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:icedtea:1.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:1.9.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0025
reference_id CVE-2011-0025
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0025
31
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
32
reference_url https://usn.ubuntu.com/1055-1/
reference_id USN-1055-1
reference_type
scores
url https://usn.ubuntu.com/1055-1/
Weaknesses
0
cwe_id 347
name Improper Verification of Cryptographic Signature
description The product does not verify, or incorrectly verifies, the cryptographic signature for data.
1
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score6.8 - 6.8
Exploitability0.5
Weighted_severity6.1
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-71j7-fgmc-9ygm