Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/openjfx@8u111-b14-1
Typedeb
Namespacedebian
Nameopenjfx
Version8u111-b14-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version11.0.2+1-1
Latest_non_vulnerable_version11.0.2+1-1
Affected_by_vulnerabilities
0
url VCID-2znn-4qpa-6kbm
vulnerability_id VCID-2znn-4qpa-6kbm
summary Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14664.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-14664
reference_id
reference_type
scores
0
value 0.01068
scoring_system epss
scoring_elements 0.77658
published_at 2026-04-01T12:55:00Z
1
value 0.01068
scoring_system epss
scoring_elements 0.77665
published_at 2026-04-02T12:55:00Z
2
value 0.01068
scoring_system epss
scoring_elements 0.77753
published_at 2026-04-18T12:55:00Z
3
value 0.01068
scoring_system epss
scoring_elements 0.77692
published_at 2026-04-04T12:55:00Z
4
value 0.01068
scoring_system epss
scoring_elements 0.77675
published_at 2026-04-07T12:55:00Z
5
value 0.01068
scoring_system epss
scoring_elements 0.77703
published_at 2026-04-08T12:55:00Z
6
value 0.01068
scoring_system epss
scoring_elements 0.77707
published_at 2026-04-09T12:55:00Z
7
value 0.01068
scoring_system epss
scoring_elements 0.77734
published_at 2026-04-11T12:55:00Z
8
value 0.01068
scoring_system epss
scoring_elements 0.77718
published_at 2026-04-12T12:55:00Z
9
value 0.01068
scoring_system epss
scoring_elements 0.77717
published_at 2026-04-13T12:55:00Z
10
value 0.01068
scoring_system epss
scoring_elements 0.77754
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-14664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14664
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1866027
reference_id 1866027
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1866027
5
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/
url https://security.gentoo.org/glsa/202209-15
6
reference_url https://security.gentoo.org/glsa/202409-26
reference_id GLSA-202409-26
reference_type
scores
url https://security.gentoo.org/glsa/202409-26
7
reference_url https://security.netapp.com/advisory/ntap-20200717-0005/
reference_id ntap-20200717-0005
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/
url https://security.netapp.com/advisory/ntap-20200717-0005/
8
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-897/
reference_id ZDI-20-897
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-27T17:54:50Z/
url https://www.zerodayinitiative.com/advisories/ZDI-20-897/
fixed_packages
0
url pkg:deb/debian/openjfx@11.0.2%2B1-1
purl pkg:deb/debian/openjfx@11.0.2%2B1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1
aliases CVE-2020-14664
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2znn-4qpa-6kbm
1
url VCID-4m47-kkyx-dyet
vulnerability_id VCID-4m47-kkyx-dyet
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10086.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10086.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10086
reference_id
reference_type
scores
0
value 0.01124
scoring_system epss
scoring_elements 0.783
published_at 2026-04-18T12:55:00Z
1
value 0.01124
scoring_system epss
scoring_elements 0.78215
published_at 2026-04-01T12:55:00Z
2
value 0.01124
scoring_system epss
scoring_elements 0.78223
published_at 2026-04-02T12:55:00Z
3
value 0.01124
scoring_system epss
scoring_elements 0.78254
published_at 2026-04-04T12:55:00Z
4
value 0.01124
scoring_system epss
scoring_elements 0.78236
published_at 2026-04-07T12:55:00Z
5
value 0.01124
scoring_system epss
scoring_elements 0.78263
published_at 2026-04-08T12:55:00Z
6
value 0.01124
scoring_system epss
scoring_elements 0.78268
published_at 2026-04-09T12:55:00Z
7
value 0.01124
scoring_system epss
scoring_elements 0.78294
published_at 2026-04-11T12:55:00Z
8
value 0.01124
scoring_system epss
scoring_elements 0.78277
published_at 2026-04-12T12:55:00Z
9
value 0.01124
scoring_system epss
scoring_elements 0.78272
published_at 2026-04-13T12:55:00Z
10
value 0.01124
scoring_system epss
scoring_elements 0.78303
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10086
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url http://www.securitytracker.com/id/1038931
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472657
reference_id 1472657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472657
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860
reference_id 870860
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860
8
reference_url http://www.securityfocus.com/bid/99662
reference_id 99662
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url http://www.securityfocus.com/bid/99662
9
reference_url http://www.debian.org/security/2017/dsa-4005
reference_id dsa-4005
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url http://www.debian.org/security/2017/dsa-4005
10
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url https://security.gentoo.org/glsa/201709-22
11
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
12
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url https://access.redhat.com/errata/RHSA-2017:1790
13
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:48Z/
url https://access.redhat.com/errata/RHSA-2017:1791
fixed_packages
0
url pkg:deb/debian/openjfx@8u141-b14-3~deb9u1
purl pkg:deb/debian/openjfx@8u141-b14-3~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2znn-4qpa-6kbm
1
vulnerability VCID-5bfn-1ajw-cqdr
2
vulnerability VCID-a91k-9kv3-yfb9
3
vulnerability VCID-jvtu-gg6n-hyce
4
vulnerability VCID-jw3n-w9gu-x3hg
5
vulnerability VCID-yptm-3aag-fqbj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u141-b14-3~deb9u1
aliases CVE-2017-10086
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4m47-kkyx-dyet
2
url VCID-5bfn-1ajw-cqdr
vulnerability_id VCID-5bfn-1ajw-cqdr
summary
Multiple vulnerabilities have been found in Oracle's JDK and JRE
    software suites, the worst of which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2581.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2581.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2581
reference_id
reference_type
scores
0
value 0.00492
scoring_system epss
scoring_elements 0.65696
published_at 2026-04-18T12:55:00Z
1
value 0.00492
scoring_system epss
scoring_elements 0.65563
published_at 2026-04-01T12:55:00Z
2
value 0.00492
scoring_system epss
scoring_elements 0.65611
published_at 2026-04-02T12:55:00Z
3
value 0.00492
scoring_system epss
scoring_elements 0.65671
published_at 2026-04-09T12:55:00Z
4
value 0.00492
scoring_system epss
scoring_elements 0.65691
published_at 2026-04-11T12:55:00Z
5
value 0.00492
scoring_system epss
scoring_elements 0.65677
published_at 2026-04-12T12:55:00Z
6
value 0.00492
scoring_system epss
scoring_elements 0.65648
published_at 2026-04-13T12:55:00Z
7
value 0.00492
scoring_system epss
scoring_elements 0.65683
published_at 2026-04-16T12:55:00Z
8
value 0.00492
scoring_system epss
scoring_elements 0.65641
published_at 2026-04-04T12:55:00Z
9
value 0.00492
scoring_system epss
scoring_elements 0.65607
published_at 2026-04-07T12:55:00Z
10
value 0.00492
scoring_system epss
scoring_elements 0.65658
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2581
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2581
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2581
3
reference_url http://www.securityfocus.com/bid/102636
reference_id 102636
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/
url http://www.securityfocus.com/bid/102636
4
reference_url http://www.securitytracker.com/id/1040203
reference_id 1040203
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/
url http://www.securitytracker.com/id/1040203
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1535354
reference_id 1535354
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1535354
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888530
reference_id 888530
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=888530
7
reference_url https://security.gentoo.org/glsa/201803-06
reference_id GLSA-201803-06
reference_type
scores
url https://security.gentoo.org/glsa/201803-06
8
reference_url https://security.netapp.com/advisory/ntap-20180117-0001/
reference_id ntap-20180117-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/
url https://security.netapp.com/advisory/ntap-20180117-0001/
9
reference_url https://access.redhat.com/errata/RHSA-2018:0099
reference_id RHSA-2018:0099
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/
url https://access.redhat.com/errata/RHSA-2018:0099
10
reference_url https://access.redhat.com/errata/RHSA-2018:0100
reference_id RHSA-2018:0100
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/
url https://access.redhat.com/errata/RHSA-2018:0100
11
reference_url https://access.redhat.com/errata/RHSA-2018:1463
reference_id RHSA-2018:1463
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/
url https://access.redhat.com/errata/RHSA-2018:1463
12
reference_url https://access.redhat.com/errata/RHSA-2018:1812
reference_id RHSA-2018:1812
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T19:22:58Z/
url https://access.redhat.com/errata/RHSA-2018:1812
fixed_packages
0
url pkg:deb/debian/openjfx@11.0.2%2B1-1
purl pkg:deb/debian/openjfx@11.0.2%2B1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1
aliases CVE-2018-2581
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5bfn-1ajw-cqdr
3
url VCID-a91k-9kv3-yfb9
vulnerability_id VCID-a91k-9kv3-yfb9
summary JavaFX: unauthorized creation, deletion or modification access to critical data via multiple protocols
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22043.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22043.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22043
reference_id
reference_type
scores
0
value 0.00249
scoring_system epss
scoring_elements 0.48187
published_at 2026-04-02T12:55:00Z
1
value 0.00249
scoring_system epss
scoring_elements 0.48262
published_at 2026-04-18T12:55:00Z
2
value 0.00249
scoring_system epss
scoring_elements 0.48205
published_at 2026-04-09T12:55:00Z
3
value 0.00249
scoring_system epss
scoring_elements 0.48229
published_at 2026-04-11T12:55:00Z
4
value 0.00249
scoring_system epss
scoring_elements 0.48204
published_at 2026-04-12T12:55:00Z
5
value 0.00249
scoring_system epss
scoring_elements 0.48216
published_at 2026-04-13T12:55:00Z
6
value 0.00249
scoring_system epss
scoring_elements 0.48267
published_at 2026-04-16T12:55:00Z
7
value 0.00249
scoring_system epss
scoring_elements 0.48206
published_at 2026-04-04T12:55:00Z
8
value 0.00249
scoring_system epss
scoring_elements 0.48158
published_at 2026-04-07T12:55:00Z
9
value 0.00249
scoring_system epss
scoring_elements 0.48211
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22043
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22043
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224658
reference_id 2224658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224658
5
reference_url https://www.oracle.com/security-alerts/cpujul2023.html
reference_id cpujul2023.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:03Z/
url https://www.oracle.com/security-alerts/cpujul2023.html
6
reference_url https://security.netapp.com/advisory/ntap-20230725-0006/
reference_id ntap-20230725-0006
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T16:29:03Z/
url https://security.netapp.com/advisory/ntap-20230725-0006/
fixed_packages
0
url pkg:deb/debian/openjfx@11.0.2%2B1-1
purl pkg:deb/debian/openjfx@11.0.2%2B1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1
aliases CVE-2023-22043
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a91k-9kv3-yfb9
4
url VCID-jvtu-gg6n-hyce
vulnerability_id VCID-jvtu-gg6n-hyce
summary JDK: unspecified vulnerability fixed in 7u191, 8u181, and 10.0.2 (JavaFX)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2941.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-2941.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-2941
reference_id
reference_type
scores
0
value 0.01275
scoring_system epss
scoring_elements 0.79571
published_at 2026-04-18T12:55:00Z
1
value 0.01275
scoring_system epss
scoring_elements 0.79538
published_at 2026-04-08T12:55:00Z
2
value 0.01275
scoring_system epss
scoring_elements 0.79546
published_at 2026-04-09T12:55:00Z
3
value 0.01275
scoring_system epss
scoring_elements 0.79568
published_at 2026-04-11T12:55:00Z
4
value 0.01275
scoring_system epss
scoring_elements 0.79551
published_at 2026-04-12T12:55:00Z
5
value 0.01275
scoring_system epss
scoring_elements 0.79543
published_at 2026-04-13T12:55:00Z
6
value 0.01275
scoring_system epss
scoring_elements 0.79572
published_at 2026-04-16T12:55:00Z
7
value 0.01275
scoring_system epss
scoring_elements 0.795
published_at 2026-04-02T12:55:00Z
8
value 0.01275
scoring_system epss
scoring_elements 0.79494
published_at 2026-04-01T12:55:00Z
9
value 0.01275
scoring_system epss
scoring_elements 0.79524
published_at 2026-04-04T12:55:00Z
10
value 0.01275
scoring_system epss
scoring_elements 0.7951
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-2941
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2941
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://security.netapp.com/advisory/ntap-20180726-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/
url https://security.netapp.com/advisory/ntap-20180726-0001/
5
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
6
reference_url http://www.securityfocus.com/bid/104775
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/
url http://www.securityfocus.com/bid/104775
7
reference_url http://www.securitytracker.com/id/1041302
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/
url http://www.securitytracker.com/id/1041302
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1602143
reference_id 1602143
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1602143
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905215
reference_id 905215
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=905215
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_id cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:10.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update181:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update172:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:10.0.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update181:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update172:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-2941
reference_id CVE-2018-2941
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-2941
32
reference_url https://access.redhat.com/errata/RHSA-2018:2253
reference_id RHSA-2018:2253
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/
url https://access.redhat.com/errata/RHSA-2018:2253
33
reference_url https://access.redhat.com/errata/RHSA-2018:2254
reference_id RHSA-2018:2254
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/
url https://access.redhat.com/errata/RHSA-2018:2254
34
reference_url https://access.redhat.com/errata/RHSA-2018:2255
reference_id RHSA-2018:2255
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/
url https://access.redhat.com/errata/RHSA-2018:2255
35
reference_url https://access.redhat.com/errata/RHSA-2018:2256
reference_id RHSA-2018:2256
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:44Z/
url https://access.redhat.com/errata/RHSA-2018:2256
fixed_packages
0
url pkg:deb/debian/openjfx@11.0.2%2B1-1
purl pkg:deb/debian/openjfx@11.0.2%2B1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1
aliases CVE-2018-2941
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvtu-gg6n-hyce
5
url VCID-jw3n-w9gu-x3hg
vulnerability_id VCID-jw3n-w9gu-x3hg
summary
Multiple vulnerabilities have been found in Oracle’s JDK and JRE
    software suites.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3209.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-3209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-3209
reference_id
reference_type
scores
0
value 0.01242
scoring_system epss
scoring_elements 0.79284
published_at 2026-04-18T12:55:00Z
1
value 0.01242
scoring_system epss
scoring_elements 0.79214
published_at 2026-04-01T12:55:00Z
2
value 0.01242
scoring_system epss
scoring_elements 0.79221
published_at 2026-04-02T12:55:00Z
3
value 0.01242
scoring_system epss
scoring_elements 0.7923
published_at 2026-04-07T12:55:00Z
4
value 0.01242
scoring_system epss
scoring_elements 0.79256
published_at 2026-04-08T12:55:00Z
5
value 0.01242
scoring_system epss
scoring_elements 0.79263
published_at 2026-04-09T12:55:00Z
6
value 0.01242
scoring_system epss
scoring_elements 0.79288
published_at 2026-04-16T12:55:00Z
7
value 0.01242
scoring_system epss
scoring_elements 0.79273
published_at 2026-04-12T12:55:00Z
8
value 0.01242
scoring_system epss
scoring_elements 0.79261
published_at 2026-04-13T12:55:00Z
9
value 0.01242
scoring_system epss
scoring_elements 0.79245
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-3209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.securityfocus.com/bid/105590
reference_id 105590
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/
url http://www.securityfocus.com/bid/105590
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1639904
reference_id 1639904
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1639904
6
reference_url https://security.gentoo.org/glsa/201908-10
reference_id GLSA-201908-10
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/
url https://security.gentoo.org/glsa/201908-10
7
reference_url https://access.redhat.com/errata/RHSA-2018:3002
reference_id RHSA-2018:3002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/
url https://access.redhat.com/errata/RHSA-2018:3002
8
reference_url https://access.redhat.com/errata/RHSA-2018:3003
reference_id RHSA-2018:3003
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-02T18:16:09Z/
url https://access.redhat.com/errata/RHSA-2018:3003
fixed_packages
0
url pkg:deb/debian/openjfx@11.0.2%2B1-1
purl pkg:deb/debian/openjfx@11.0.2%2B1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1
aliases CVE-2018-3209
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jw3n-w9gu-x3hg
6
url VCID-ts2n-qwjz-nfec
vulnerability_id VCID-ts2n-qwjz-nfec
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10114.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10114.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10114
reference_id
reference_type
scores
0
value 0.01749
scoring_system epss
scoring_elements 0.82584
published_at 2026-04-18T12:55:00Z
1
value 0.01749
scoring_system epss
scoring_elements 0.82477
published_at 2026-04-01T12:55:00Z
2
value 0.01749
scoring_system epss
scoring_elements 0.82491
published_at 2026-04-02T12:55:00Z
3
value 0.01749
scoring_system epss
scoring_elements 0.82509
published_at 2026-04-04T12:55:00Z
4
value 0.01749
scoring_system epss
scoring_elements 0.82505
published_at 2026-04-07T12:55:00Z
5
value 0.01749
scoring_system epss
scoring_elements 0.82532
published_at 2026-04-08T12:55:00Z
6
value 0.01749
scoring_system epss
scoring_elements 0.82539
published_at 2026-04-09T12:55:00Z
7
value 0.01749
scoring_system epss
scoring_elements 0.82557
published_at 2026-04-11T12:55:00Z
8
value 0.01749
scoring_system epss
scoring_elements 0.82553
published_at 2026-04-12T12:55:00Z
9
value 0.01749
scoring_system epss
scoring_elements 0.82548
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10114
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10086
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10114
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url http://www.securitytracker.com/id/1038931
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472662
reference_id 1472662
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472662
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860
reference_id 870860
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870860
8
reference_url http://www.securityfocus.com/bid/99726
reference_id 99726
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url http://www.securityfocus.com/bid/99726
9
reference_url http://www.debian.org/security/2017/dsa-4005
reference_id dsa-4005
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url http://www.debian.org/security/2017/dsa-4005
10
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url https://security.gentoo.org/glsa/201709-22
11
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
12
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url https://access.redhat.com/errata/RHSA-2017:1790
13
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:27Z/
url https://access.redhat.com/errata/RHSA-2017:1791
fixed_packages
0
url pkg:deb/debian/openjfx@8u141-b14-3~deb9u1
purl pkg:deb/debian/openjfx@8u141-b14-3~deb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2znn-4qpa-6kbm
1
vulnerability VCID-5bfn-1ajw-cqdr
2
vulnerability VCID-a91k-9kv3-yfb9
3
vulnerability VCID-jvtu-gg6n-hyce
4
vulnerability VCID-jw3n-w9gu-x3hg
5
vulnerability VCID-yptm-3aag-fqbj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u141-b14-3~deb9u1
aliases CVE-2017-10114
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ts2n-qwjz-nfec
7
url VCID-yptm-3aag-fqbj
vulnerability_id VCID-yptm-3aag-fqbj
summary
Multiple vulnerabilities have been found in OpenJDK and IcedTea,
    the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2585.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-2585.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-2585
reference_id
reference_type
scores
0
value 0.01206
scoring_system epss
scoring_elements 0.78913
published_at 2026-04-01T12:55:00Z
1
value 0.01206
scoring_system epss
scoring_elements 0.78919
published_at 2026-04-02T12:55:00Z
2
value 0.01206
scoring_system epss
scoring_elements 0.78988
published_at 2026-04-16T12:55:00Z
3
value 0.01206
scoring_system epss
scoring_elements 0.78947
published_at 2026-04-04T12:55:00Z
4
value 0.01206
scoring_system epss
scoring_elements 0.7893
published_at 2026-04-07T12:55:00Z
5
value 0.01206
scoring_system epss
scoring_elements 0.78955
published_at 2026-04-08T12:55:00Z
6
value 0.01206
scoring_system epss
scoring_elements 0.78961
published_at 2026-04-09T12:55:00Z
7
value 0.01206
scoring_system epss
scoring_elements 0.78984
published_at 2026-04-18T12:55:00Z
8
value 0.01206
scoring_system epss
scoring_elements 0.78969
published_at 2026-04-12T12:55:00Z
9
value 0.01206
scoring_system epss
scoring_elements 0.78959
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-2585
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2585
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1807936
reference_id 1807936
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1807936
5
reference_url https://security.gentoo.org/glsa/202006-22
reference_id GLSA-202006-22
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:50Z/
url https://security.gentoo.org/glsa/202006-22
6
reference_url https://security.gentoo.org/glsa/202209-15
reference_id GLSA-202209-15
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-30T15:04:50Z/
url https://security.gentoo.org/glsa/202209-15
fixed_packages
0
url pkg:deb/debian/openjfx@11.0.2%2B1-1
purl pkg:deb/debian/openjfx@11.0.2%2B1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@11.0.2%252B1-1
aliases CVE-2020-2585
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yptm-3aag-fqbj
Fixing_vulnerabilities
0
url VCID-26wp-rmjk-huc8
vulnerability_id VCID-26wp-rmjk-huc8
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites allowing remote attackers to remotely execute arbitrary
    code, obtain information, and cause Denial of Service.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3498.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3498.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3498
reference_id
reference_type
scores
0
value 0.07768
scoring_system epss
scoring_elements 0.91924
published_at 2026-04-02T12:55:00Z
1
value 0.07768
scoring_system epss
scoring_elements 0.91972
published_at 2026-04-18T12:55:00Z
2
value 0.07768
scoring_system epss
scoring_elements 0.91975
published_at 2026-04-16T12:55:00Z
3
value 0.07768
scoring_system epss
scoring_elements 0.91955
published_at 2026-04-13T12:55:00Z
4
value 0.07768
scoring_system epss
scoring_elements 0.91959
published_at 2026-04-12T12:55:00Z
5
value 0.07768
scoring_system epss
scoring_elements 0.91956
published_at 2026-04-09T12:55:00Z
6
value 0.07768
scoring_system epss
scoring_elements 0.91951
published_at 2026-04-08T12:55:00Z
7
value 0.07768
scoring_system epss
scoring_elements 0.91938
published_at 2026-04-07T12:55:00Z
8
value 0.07768
scoring_system epss
scoring_elements 0.91916
published_at 2026-04-01T12:55:00Z
9
value 0.07768
scoring_system epss
scoring_elements 0.91931
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3498
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://security.netapp.com/advisory/ntap-20160721-0001/
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url https://security.netapp.com/advisory/ntap-20160721-0001/
12
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
13
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url http://www.securityfocus.com/bid/91787
14
reference_url http://www.securityfocus.com/bid/91956
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url http://www.securityfocus.com/bid/91956
15
reference_url http://www.securitytracker.com/id/1036365
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url http://www.securitytracker.com/id/1036365
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1358170
reference_id 1358170
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1358170
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832419
reference_id 832419
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832419
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3498
reference_id CVE-2016-3498
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2016-3498
23
reference_url https://security.gentoo.org/glsa/201610-08
reference_id GLSA-201610-08
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url https://security.gentoo.org/glsa/201610-08
24
reference_url https://access.redhat.com/errata/RHSA-2016:1475
reference_id RHSA-2016:1475
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url https://access.redhat.com/errata/RHSA-2016:1475
25
reference_url https://access.redhat.com/errata/RHSA-2016:1476
reference_id RHSA-2016:1476
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-11T20:11:32Z/
url https://access.redhat.com/errata/RHSA-2016:1476
fixed_packages
0
url pkg:deb/debian/openjfx@8u111-b14-1
purl pkg:deb/debian/openjfx@8u111-b14-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2znn-4qpa-6kbm
1
vulnerability VCID-4m47-kkyx-dyet
2
vulnerability VCID-5bfn-1ajw-cqdr
3
vulnerability VCID-a91k-9kv3-yfb9
4
vulnerability VCID-jvtu-gg6n-hyce
5
vulnerability VCID-jw3n-w9gu-x3hg
6
vulnerability VCID-ts2n-qwjz-nfec
7
vulnerability VCID-yptm-3aag-fqbj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u111-b14-1
aliases CVE-2016-3498
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26wp-rmjk-huc8
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/openjfx@8u111-b14-1