{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86059?format=json","vulnerability_id":"VCID-keub-rq9p-vqhh","summary":"JDK: privilege escalation via shared class cache","aliases":[{"alias":"CVE-2014-3065"}],"fixed_packages":[],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/120682?format=json","purl":"pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.8-1jpp.1?arch=el6_6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-56dc-jab3-jubm"},{"vulnerability":"VCID-hwk7-33xw-pqhy"},{"vulnerability":"VCID-kdct-g1je-hkc5"},{"vulnerability":"VCID-keub-rq9p-vqhh"},{"vulnerability":"VCID-mjry-sm7c-pubz"},{"vulnerability":"VCID-n9gc-93v2-ukdm"},{"vulnerability":"VCID-t4vm-9pr1-dbav"},{"vulnerability":"VCID-xap5-djda-2uem"},{"vulnerability":"VCID-ydpy-su7k-ffe9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.8-1jpp.1%3Farch=el6_6"},{"url":"http://public2.vulnerablecode.io/api/packages/120677?format=json","purl":"pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.8-1jpp.1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-56dc-jab3-jubm"},{"vulnerability":"VCID-hwk7-33xw-pqhy"},{"vulnerability":"VCID-kdct-g1je-hkc5"},{"vulnerability":"VCID-keub-rq9p-vqhh"},{"vulnerability":"VCID-mjry-sm7c-pubz"},{"vulnerability":"VCID-n9gc-93v2-ukdm"},{"vulnerability":"VCID-t4vm-9pr1-dbav"},{"vulnerability":"VCID-xap5-djda-2uem"},{"vulnerability":"VCID-ydpy-su7k-ffe9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.8-1jpp.1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/120680?format=json","purl":"pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.2-1jpp.1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-13cc-fgdq-jygw"},{"vulnerability":"VCID-56dc-jab3-jubm"},{"vulnerability":"VCID-9yus-96z5-dub9"},{"vulnerability":"VCID-bmb1-ekh1-9fc3"},{"vulnerability":"VCID-gst6-e8vf-jff8"},{"vulnerability":"VCID-hwk7-33xw-pqhy"},{"vulnerability":"VCID-kbur-d5ax-jqgk"},{"vulnerability":"VCID-kdct-g1je-hkc5"},{"vulnerability":"VCID-keub-rq9p-vqhh"},{"vulnerability":"VCID-kwca-ph6k-wqar"},{"vulnerability":"VCID-mjry-sm7c-pubz"},{"vulnerability":"VCID-n9gc-93v2-ukdm"},{"vulnerability":"VCID-t4vm-9pr1-dbav"},{"vulnerability":"VCID-uhsa-uttv-mfes"},{"vulnerability":"VCID-xap5-djda-2uem"},{"vulnerability":"VCID-ydpy-su7k-ffe9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.2-1jpp.1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/120681?format=json","purl":"pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.2-1jpp.1?arch=el6_6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-13cc-fgdq-jygw"},{"vulnerability":"VCID-56dc-jab3-jubm"},{"vulnerability":"VCID-9yus-96z5-dub9"},{"vulnerability":"VCID-bmb1-ekh1-9fc3"},{"vulnerability":"VCID-gst6-e8vf-jff8"},{"vulnerability":"VCID-hwk7-33xw-pqhy"},{"vulnerability":"VCID-kbur-d5ax-jqgk"},{"vulnerability":"VCID-kdct-g1je-hkc5"},{"vulnerability":"VCID-keub-rq9p-vqhh"},{"vulnerability":"VCID-kwca-ph6k-wqar"},{"vulnerability":"VCID-mjry-sm7c-pubz"},{"vulnerability":"VCID-n9gc-93v2-ukdm"},{"vulnerability":"VCID-t4vm-9pr1-dbav"},{"vulnerability":"VCID-uhsa-uttv-mfes"},{"vulnerability":"VCID-xap5-djda-2uem"},{"vulnerability":"VCID-ydpy-su7k-ffe9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.2-1jpp.1%3Farch=el6_6"},{"url":"http://public2.vulnerablecode.io/api/packages/120359?format=json","purl":"pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.3-1jpp.1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-13cc-fgdq-jygw"},{"vulnerability":"VCID-4nna-17uk-13a1"},{"vulnerability":"VCID-56dc-jab3-jubm"},{"vulnerability":"VCID-753c-x7gd-37dd"},{"vulnerability":"VCID-8muz-j586-jubr"},{"vulnerability":"VCID-927f-vkza-gfck"},{"vulnerability":"VCID-9yus-96z5-dub9"},{"vulnerability":"VCID-aefw-31dp-ufg8"},{"vulnerability":"VCID-bmb1-ekh1-9fc3"},{"vulnerability":"VCID-ccht-tkj5-jfez"},{"vulnerability":"VCID-cjda-feye-v3fd"},{"vulnerability":"VCID-dr2n-9pz1-gfd5"},{"vulnerability":"VCID-edhe-xduh-8fb9"},{"vulnerability":"VCID-f34q-etf1-7qdp"},{"vulnerability":"VCID-f46c-z1vt-jkae"},{"vulnerability":"VCID-fass-3uxv-rbdc"},{"vulnerability":"VCID-fwvc-5k33-fkbm"},{"vulnerability":"VCID-gst6-e8vf-jff8"},{"vulnerability":"VCID-hwk7-33xw-pqhy"},{"vulnerability":"VCID-jqmy-2cq5-v7gf"},{"vulnerability":"VCID-kbur-d5ax-jqgk"},{"vulnerability":"VCID-kdct-g1je-hkc5"},{"vulnerability":"VCID-keub-rq9p-vqhh"},{"vulnerability":"VCID-kwca-ph6k-wqar"},{"vulnerability":"VCID-mjry-sm7c-pubz"},{"vulnerability":"VCID-n9gc-93v2-ukdm"},{"vulnerability":"VCID-ntmk-ub1c-5ygz"},{"vulnerability":"VCID-nyhx-9tes-9ygr"},{"vulnerability":"VCID-pz85-gym7-wub1"},{"vulnerability":"VCID-t4vm-9pr1-dbav"},{"vulnerability":"VCID-uhsa-uttv-mfes"},{"vulnerability":"VCID-v6xh-u5b3-zffs"},{"vulnerability":"VCID-v8dj-c1hh-wbe8"},{"vulnerability":"VCID-vuvu-hscm-guh1"},{"vulnerability":"VCID-wgn7-zgah-qkg6"},{"vulnerability":"VCID-wy3y-qjfn-xudt"},{"vulnerability":"VCID-xap5-djda-2uem"},{"vulnerability":"VCID-xgvx-tpbg-73hf"},{"vulnerability":"VCID-xry5-hzk4-b3b8"},{"vulnerability":"VCID-ydpy-su7k-ffe9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.3-1jpp.1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/120684?format=json","purl":"pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.8.0-1jpp.1?arch=el6_6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-13cc-fgdq-jygw"},{"vulnerability":"VCID-1e6n-3kbt-xucw"},{"vulnerability":"VCID-56dc-jab3-jubm"},{"vulnerability":"VCID-9yus-96z5-dub9"},{"vulnerability":"VCID-bmb1-ekh1-9fc3"},{"vulnerability":"VCID-gst6-e8vf-jff8"},{"vulnerability":"VCID-hwk7-33xw-pqhy"},{"vulnerability":"VCID-kbur-d5ax-jqgk"},{"vulnerability":"VCID-kdct-g1je-hkc5"},{"vulnerability":"VCID-keub-rq9p-vqhh"},{"vulnerability":"VCID-kwca-ph6k-wqar"},{"vulnerability":"VCID-mjry-sm7c-pubz"},{"vulnerability":"VCID-n9gc-93v2-ukdm"},{"vulnerability":"VCID-qr8w-umju-9yfd"},{"vulnerability":"VCID-t4vm-9pr1-dbav"},{"vulnerability":"VCID-ue2f-emuu-43af"},{"vulnerability":"VCID-uhsa-uttv-mfes"},{"vulnerability":"VCID-xap5-djda-2uem"},{"vulnerability":"VCID-ydpy-su7k-ffe9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.8.0-1jpp.1%3Farch=el6_6"},{"url":"http://public2.vulnerablecode.io/api/packages/120678?format=json","purl":"pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.8.0-1jpp.1?arch=el5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-13cc-fgdq-jygw"},{"vulnerability":"VCID-1e6n-3kbt-xucw"},{"vulnerability":"VCID-56dc-jab3-jubm"},{"vulnerability":"VCID-9yus-96z5-dub9"},{"vulnerability":"VCID-bmb1-ekh1-9fc3"},{"vulnerability":"VCID-gst6-e8vf-jff8"},{"vulnerability":"VCID-hwk7-33xw-pqhy"},{"vulnerability":"VCID-kbur-d5ax-jqgk"},{"vulnerability":"VCID-kdct-g1je-hkc5"},{"vulnerability":"VCID-keub-rq9p-vqhh"},{"vulnerability":"VCID-kwca-ph6k-wqar"},{"vulnerability":"VCID-mjry-sm7c-pubz"},{"vulnerability":"VCID-n9gc-93v2-ukdm"},{"vulnerability":"VCID-qr8w-umju-9yfd"},{"vulnerability":"VCID-t4vm-9pr1-dbav"},{"vulnerability":"VCID-ue2f-emuu-43af"},{"vulnerability":"VCID-uhsa-uttv-mfes"},{"vulnerability":"VCID-xap5-djda-2uem"},{"vulnerability":"VCID-ydpy-su7k-ffe9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.8.0-1jpp.1%3Farch=el5"},{"url":"http://public2.vulnerablecode.io/api/packages/120683?format=json","purl":"pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.2.0-1jpp.3?arch=el7_0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-13cc-fgdq-jygw"},{"vulnerability":"VCID-1e6n-3kbt-xucw"},{"vulnerability":"VCID-56dc-jab3-jubm"},{"vulnerability":"VCID-9yus-96z5-dub9"},{"vulnerability":"VCID-bmb1-ekh1-9fc3"},{"vulnerability":"VCID-gst6-e8vf-jff8"},{"vulnerability":"VCID-hwk7-33xw-pqhy"},{"vulnerability":"VCID-kbur-d5ax-jqgk"},{"vulnerability":"VCID-kdct-g1je-hkc5"},{"vulnerability":"VCID-keub-rq9p-vqhh"},{"vulnerability":"VCID-kwca-ph6k-wqar"},{"vulnerability":"VCID-mjry-sm7c-pubz"},{"vulnerability":"VCID-n9gc-93v2-ukdm"},{"vulnerability":"VCID-qr8w-umju-9yfd"},{"vulnerability":"VCID-t4vm-9pr1-dbav"},{"vulnerability":"VCID-ue2f-emuu-43af"},{"vulnerability":"VCID-uhsa-uttv-mfes"},{"vulnerability":"VCID-xap5-djda-2uem"},{"vulnerability":"VCID-ydpy-su7k-ffe9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.2.0-1jpp.3%3Farch=el7_0"},{"url":"http://public2.vulnerablecode.io/api/packages/120679?format=json","purl":"pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.2.0-1jpp.3?arch=el6_6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-13cc-fgdq-jygw"},{"vulnerability":"VCID-1e6n-3kbt-xucw"},{"vulnerability":"VCID-56dc-jab3-jubm"},{"vulnerability":"VCID-9yus-96z5-dub9"},{"vulnerability":"VCID-bmb1-ekh1-9fc3"},{"vulnerability":"VCID-gst6-e8vf-jff8"},{"vulnerability":"VCID-hwk7-33xw-pqhy"},{"vulnerability":"VCID-kbur-d5ax-jqgk"},{"vulnerability":"VCID-kdct-g1je-hkc5"},{"vulnerability":"VCID-keub-rq9p-vqhh"},{"vulnerability":"VCID-kwca-ph6k-wqar"},{"vulnerability":"VCID-mjry-sm7c-pubz"},{"vulnerability":"VCID-n9gc-93v2-ukdm"},{"vulnerability":"VCID-qr8w-umju-9yfd"},{"vulnerability":"VCID-t4vm-9pr1-dbav"},{"vulnerability":"VCID-ue2f-emuu-43af"},{"vulnerability":"VCID-uhsa-uttv-mfes"},{"vulnerability":"VCID-xap5-djda-2uem"},{"vulnerability":"VCID-ydpy-su7k-ffe9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.2.0-1jpp.3%3Farch=el6_6"}],"references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1876.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1877.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1880.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1881.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1881.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1882.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0264.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3065.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3065.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3065","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26349","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26622","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26669","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2671","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26613","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26572","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26515","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26522","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26495","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26457","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26397","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26391","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26335","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26202","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26268","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26323","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26252","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3065"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV66044","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV66044"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV66045","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IV66045"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21688283"},{"reference_url":"http://www.securityfocus.com/bid/71147","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71147"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1162554","reference_id":"1162554","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1162554"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3065","reference_id":"CVE-2014-3065","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1876","reference_id":"RHSA-2014:1876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1877","reference_id":"RHSA-2014:1877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1880","reference_id":"RHSA-2014:1880","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1881","reference_id":"RHSA-2014:1881","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1881"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1882","reference_id":"RHSA-2014:1882","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1882"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0264","reference_id":"RHSA-2015:0264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0264"}],"weaknesses":[{"cwe_id":94,"name":"Improper Control of Generation of Code ('Code Injection')","description":"The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment."}],"exploits":[],"severity_range_score":"6.9 - 6.9","exploitability":"0.5","weighted_severity":"6.2","risk_score":3.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-keub-rq9p-vqhh"}