Lookup for vulnerable packages by Package URL.

GET /api/packages/1037460?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1037460?format=api",
    "purl": "pkg:deb/debian/openjfx@8u102-b14-1~bpo8%2B1",
    "type": "deb",
    "namespace": "debian",
    "name": "openjfx",
    "version": "8u102-b14-1~bpo8+1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "11.0.2+1-1",
    "latest_non_vulnerable_version": "11.0.2+1-1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50862?format=api",
            "vulnerability_id": "VCID-26wp-rmjk-huc8",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3498.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3498.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91924",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91975",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91955",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91959",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91956",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91951",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91938",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91931",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91916",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20160721-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91787"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91956",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/91956"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1036365",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1036365"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358170",
                    "reference_id": "1358170",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358170"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832419",
                    "reference_id": "832419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832419"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3498",
                    "reference_id": "CVE-2016-3498",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3498"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201610-08",
                    "reference_id": "GLSA-201610-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201610-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475",
                    "reference_id": "RHSA-2016:1475",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476",
                    "reference_id": "RHSA-2016:1476",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1476"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037461?format=api",
                    "purl": "pkg:deb/debian/openjfx@8u111-b14-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2znn-4qpa-6kbm"
                        },
                        {
                            "vulnerability": "VCID-4m47-kkyx-dyet"
                        },
                        {
                            "vulnerability": "VCID-5bfn-1ajw-cqdr"
                        },
                        {
                            "vulnerability": "VCID-a91k-9kv3-yfb9"
                        },
                        {
                            "vulnerability": "VCID-jvtu-gg6n-hyce"
                        },
                        {
                            "vulnerability": "VCID-jw3n-w9gu-x3hg"
                        },
                        {
                            "vulnerability": "VCID-ts2n-qwjz-nfec"
                        },
                        {
                            "vulnerability": "VCID-yptm-3aag-fqbj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u111-b14-1"
                }
            ],
            "aliases": [
                "CVE-2016-3498"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-26wp-rmjk-huc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34415?format=api",
            "vulnerability_id": "VCID-2znn-4qpa-6kbm",
            "summary": "Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14664.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14664.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77658",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77665",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77754",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77692",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77675",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77703",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77707",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77734",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77718",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77717",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14664"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14664"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866027",
                    "reference_id": "1866027",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1866027"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-15",
                    "reference_id": "GLSA-202209-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-15"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-26",
                    "reference_id": "GLSA-202409-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-26"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200717-0005/",
                    "reference_id": "ntap-20200717-0005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200717-0005/"
                },
                {
                    "reference_url": "https://www.zerodayinitiative.com/advisories/ZDI-20-897/",
                    "reference_id": "ZDI-20-897",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/"
                        }
                    ],
                    "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-897/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050271?format=api",
                    "purl": "pkg:deb/debian/openjfx@11.0.2%2B1-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1"
                }
            ],
            "aliases": [
                "CVE-2020-14664"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2znn-4qpa-6kbm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31616?format=api",
            "vulnerability_id": "VCID-4m47-kkyx-dyet",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10086.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10086.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10086",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78303",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78215",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78223",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78254",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78236",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78263",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78268",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78294",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78277",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01124",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78272",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10086"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472657",
                    "reference_id": "1472657",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472657"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860",
                    "reference_id": "870860",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99662",
                    "reference_id": "99662",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99662"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-4005",
                    "reference_id": "dsa-4005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-4005"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037462?format=api",
                    "purl": "pkg:deb/debian/openjfx@8u141-b14-3~deb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2znn-4qpa-6kbm"
                        },
                        {
                            "vulnerability": "VCID-5bfn-1ajw-cqdr"
                        },
                        {
                            "vulnerability": "VCID-a91k-9kv3-yfb9"
                        },
                        {
                            "vulnerability": "VCID-jvtu-gg6n-hyce"
                        },
                        {
                            "vulnerability": "VCID-jw3n-w9gu-x3hg"
                        },
                        {
                            "vulnerability": "VCID-yptm-3aag-fqbj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u141-b14-3~deb9u1"
                }
            ],
            "aliases": [
                "CVE-2017-10086"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4m47-kkyx-dyet"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43628?format=api",
            "vulnerability_id": "VCID-5bfn-1ajw-cqdr",
            "summary": "Multiple vulnerabilities have been found in Oracle's JDK and JRE\n    software suites, the worst of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2581.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2581.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65683",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65563",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65611",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65658",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65671",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65691",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65677",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65648",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65641",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65607",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2581"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2581",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2581"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/102636",
                    "reference_id": "102636",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/102636"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1040203",
                    "reference_id": "1040203",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1040203"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535354",
                    "reference_id": "1535354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535354"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888530",
                    "reference_id": "888530",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888530"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201803-06",
                    "reference_id": "GLSA-201803-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201803-06"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0001/",
                    "reference_id": "ntap-20180117-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180117-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0099",
                    "reference_id": "RHSA-2018:0099",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0100",
                    "reference_id": "RHSA-2018:0100",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1463",
                    "reference_id": "RHSA-2018:1463",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:1812",
                    "reference_id": "RHSA-2018:1812",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:1812"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050271?format=api",
                    "purl": "pkg:deb/debian/openjfx@11.0.2%2B1-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1"
                }
            ],
            "aliases": [
                "CVE-2018-2581"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5bfn-1ajw-cqdr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78278?format=api",
            "vulnerability_id": "VCID-a91k-9kv3-yfb9",
            "summary": "JavaFX: unauthorized creation, deletion or modification access to critical data via multiple protocols",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22043.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22043.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-22043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48187",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48267",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48211",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48205",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48229",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48216",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48206",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00249",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48158",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-22043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22043"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224658",
                    "reference_id": "2224658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224658"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2023.html",
                    "reference_id": "cpujul2023.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:03Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2023.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230725-0006/",
                    "reference_id": "ntap-20230725-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:03Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230725-0006/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050271?format=api",
                    "purl": "pkg:deb/debian/openjfx@11.0.2%2B1-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1"
                }
            ],
            "aliases": [
                "CVE-2023-22043"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a91k-9kv3-yfb9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83283?format=api",
            "vulnerability_id": "VCID-jvtu-gg6n-hyce",
            "summary": "JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2941.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2941.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.795",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7951",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79538",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79546",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79568",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79551",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79543",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79572",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79494",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01275",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79524",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-2941"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2941"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20180726-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20180726-0001/"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/104775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/104775"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1041302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1041302"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602143",
                    "reference_id": "1602143",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602143"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905215",
                    "reference_id": "905215",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905215"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2941",
                    "reference_id": "CVE-2018-2941",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2941"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2253",
                    "reference_id": "RHSA-2018:2253",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2253"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2254",
                    "reference_id": "RHSA-2018:2254",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2254"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2255",
                    "reference_id": "RHSA-2018:2255",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2255"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2256",
                    "reference_id": "RHSA-2018:2256",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2256"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050271?format=api",
                    "purl": "pkg:deb/debian/openjfx@11.0.2%2B1-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1"
                }
            ],
            "aliases": [
                "CVE-2018-2941"
            ],
            "risk_score": 3.8,
            "exploitability": "0.5",
            "weighted_severity": "7.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvtu-gg6n-hyce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50796?format=api",
            "vulnerability_id": "VCID-jw3n-w9gu-x3hg",
            "summary": "Multiple vulnerabilities have been found in Oracle’s JDK and JRE\n    software suites.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3209.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3209.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79261",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79214",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79221",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79245",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7923",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79263",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79288",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01242",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79273",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-3209"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3209",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3209"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/105590",
                    "reference_id": "105590",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/105590"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639904",
                    "reference_id": "1639904",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1639904"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-10",
                    "reference_id": "GLSA-201908-10",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201908-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3002",
                    "reference_id": "RHSA-2018:3002",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3002"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3003",
                    "reference_id": "RHSA-2018:3003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3003"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050271?format=api",
                    "purl": "pkg:deb/debian/openjfx@11.0.2%2B1-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1"
                }
            ],
            "aliases": [
                "CVE-2018-3209"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jw3n-w9gu-x3hg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31630?format=api",
            "vulnerability_id": "VCID-ts2n-qwjz-nfec",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, and IcedTea, the worst of which may allow execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10114.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10114.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10114",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82584",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82477",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82491",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82509",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82505",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82532",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82539",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82557",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82553",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82548",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-10114"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038931",
                    "reference_id": "1038931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1038931"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472662",
                    "reference_id": "1472662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1472662"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860",
                    "reference_id": "870860",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/99726",
                    "reference_id": "99726",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/99726"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-4005",
                    "reference_id": "dsa-4005",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-4005"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201709-22",
                    "reference_id": "GLSA-201709-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201709-22"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170720-0001/",
                    "reference_id": "ntap-20170720-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170720-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1790",
                    "reference_id": "RHSA-2017:1790",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1790"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1791",
                    "reference_id": "RHSA-2017:1791",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1791"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1037462?format=api",
                    "purl": "pkg:deb/debian/openjfx@8u141-b14-3~deb9u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2znn-4qpa-6kbm"
                        },
                        {
                            "vulnerability": "VCID-5bfn-1ajw-cqdr"
                        },
                        {
                            "vulnerability": "VCID-a91k-9kv3-yfb9"
                        },
                        {
                            "vulnerability": "VCID-jvtu-gg6n-hyce"
                        },
                        {
                            "vulnerability": "VCID-jw3n-w9gu-x3hg"
                        },
                        {
                            "vulnerability": "VCID-yptm-3aag-fqbj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u141-b14-3~deb9u1"
                }
            ],
            "aliases": [
                "CVE-2017-10114"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ts2n-qwjz-nfec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45881?format=api",
            "vulnerability_id": "VCID-yptm-3aag-fqbj",
            "summary": "Multiple vulnerabilities have been found in OpenJDK and IcedTea,\n    the worst of which could result in the arbitrary execution of code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2585.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2585.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78913",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78919",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78988",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78947",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7893",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78955",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78961",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78984",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78959",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-2585"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2585",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2585"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807936",
                    "reference_id": "1807936",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1807936"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202006-22",
                    "reference_id": "GLSA-202006-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202006-22"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202209-15",
                    "reference_id": "GLSA-202209-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:50Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202209-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050271?format=api",
                    "purl": "pkg:deb/debian/openjfx@11.0.2%2B1-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1"
                }
            ],
            "aliases": [
                "CVE-2020-2585"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yptm-3aag-fqbj"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u102-b14-1~bpo8%252B1"
}