Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.151-2.6.11.0?arch=el6_9
Typerpm
Namespaceredhat
Namejava-1.7.0-openjdk
Version1:1.7.0.151-2.6.11.0
Qualifiers
arch el6_9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1x1r-hjrb-6ydb
vulnerability_id VCID-1x1r-hjrb-6ydb
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10081.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10081.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10081
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52614
published_at 2026-04-02T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52571
published_at 2026-04-01T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.5264
published_at 2026-04-04T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52607
published_at 2026-04-07T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52658
published_at 2026-04-08T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52653
published_at 2026-04-09T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52703
published_at 2026-04-11T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52686
published_at 2026-04-12T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52671
published_at 2026-04-13T12:55:00Z
9
value 0.00293
scoring_system epss
scoring_elements 0.52709
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10081
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471711
reference_id 1471711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471711
29
reference_url http://www.securityfocus.com/bid/99853
reference_id 99853
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url http://www.securityfocus.com/bid/99853
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:52:39Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
40
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
aliases CVE-2017-10081
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1x1r-hjrb-6ydb
1
url VCID-3xyb-xeyq-n3dm
vulnerability_id VCID-3xyb-xeyq-n3dm
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10090.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10090.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10090
reference_id
reference_type
scores
0
value 0.00489
scoring_system epss
scoring_elements 0.65585
published_at 2026-04-16T12:55:00Z
1
value 0.00489
scoring_system epss
scoring_elements 0.65466
published_at 2026-04-01T12:55:00Z
2
value 0.00489
scoring_system epss
scoring_elements 0.65514
published_at 2026-04-02T12:55:00Z
3
value 0.00489
scoring_system epss
scoring_elements 0.65542
published_at 2026-04-04T12:55:00Z
4
value 0.00489
scoring_system epss
scoring_elements 0.65508
published_at 2026-04-07T12:55:00Z
5
value 0.00489
scoring_system epss
scoring_elements 0.6556
published_at 2026-04-08T12:55:00Z
6
value 0.00489
scoring_system epss
scoring_elements 0.65571
published_at 2026-04-09T12:55:00Z
7
value 0.00489
scoring_system epss
scoring_elements 0.6559
published_at 2026-04-11T12:55:00Z
8
value 0.00489
scoring_system epss
scoring_elements 0.65577
published_at 2026-04-12T12:55:00Z
9
value 0.00489
scoring_system epss
scoring_elements 0.65549
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10090
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471517
reference_id 1471517
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471517
29
reference_url http://www.securityfocus.com/bid/99706
reference_id 99706
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url http://www.securityfocus.com/bid/99706
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:2424
38
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:2469
39
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:2481
40
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:39Z/
url https://access.redhat.com/errata/RHSA-2017:3453
41
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
42
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
aliases CVE-2017-10090
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3xyb-xeyq-n3dm
2
url VCID-49z5-4djw-xuav
vulnerability_id VCID-49z5-4djw-xuav
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10101.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10101.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10101
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64534
published_at 2026-04-16T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10101
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471527
reference_id 1471527
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471527
29
reference_url http://www.securityfocus.com/bid/99674
reference_id 99674
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url http://www.securityfocus.com/bid/99674
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:37Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
aliases CVE-2017-10101
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49z5-4djw-xuav
3
url VCID-4ucs-3zp9-rqey
vulnerability_id VCID-4ucs-3zp9-rqey
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10053.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10053
reference_id
reference_type
scores
0
value 0.0128
scoring_system epss
scoring_elements 0.79602
published_at 2026-04-16T12:55:00Z
1
value 0.0128
scoring_system epss
scoring_elements 0.79524
published_at 2026-04-01T12:55:00Z
2
value 0.0128
scoring_system epss
scoring_elements 0.79531
published_at 2026-04-02T12:55:00Z
3
value 0.0128
scoring_system epss
scoring_elements 0.79553
published_at 2026-04-04T12:55:00Z
4
value 0.0128
scoring_system epss
scoring_elements 0.79539
published_at 2026-04-07T12:55:00Z
5
value 0.0128
scoring_system epss
scoring_elements 0.79568
published_at 2026-04-08T12:55:00Z
6
value 0.0128
scoring_system epss
scoring_elements 0.79575
published_at 2026-04-09T12:55:00Z
7
value 0.0128
scoring_system epss
scoring_elements 0.79597
published_at 2026-04-11T12:55:00Z
8
value 0.0128
scoring_system epss
scoring_elements 0.79581
published_at 2026-04-12T12:55:00Z
9
value 0.0128
scoring_system epss
scoring_elements 0.79573
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10053
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471889
reference_id 1471889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471889
29
reference_url http://www.securityfocus.com/bid/99842
reference_id 99842
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url http://www.securityfocus.com/bid/99842
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
45
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:58Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
aliases CVE-2017-10053
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ucs-3zp9-rqey
4
url VCID-5jvq-evzj-tfcc
vulnerability_id VCID-5jvq-evzj-tfcc
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10089.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10089.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10089
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64534
published_at 2026-04-16T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10089
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471270
reference_id 1471270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471270
29
reference_url http://www.securityfocus.com/bid/99659
reference_id 99659
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url http://www.securityfocus.com/bid/99659
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:46Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
aliases CVE-2017-10089
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5jvq-evzj-tfcc
5
url VCID-5vrc-h4t3-uucb
vulnerability_id VCID-5vrc-h4t3-uucb
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10243.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10243
reference_id
reference_type
scores
0
value 0.00949
scoring_system epss
scoring_elements 0.76398
published_at 2026-04-16T12:55:00Z
1
value 0.00949
scoring_system epss
scoring_elements 0.76299
published_at 2026-04-01T12:55:00Z
2
value 0.00949
scoring_system epss
scoring_elements 0.76302
published_at 2026-04-02T12:55:00Z
3
value 0.00949
scoring_system epss
scoring_elements 0.76332
published_at 2026-04-04T12:55:00Z
4
value 0.00949
scoring_system epss
scoring_elements 0.76312
published_at 2026-04-07T12:55:00Z
5
value 0.00949
scoring_system epss
scoring_elements 0.76345
published_at 2026-04-08T12:55:00Z
6
value 0.00949
scoring_system epss
scoring_elements 0.76358
published_at 2026-04-13T12:55:00Z
7
value 0.00949
scoring_system epss
scoring_elements 0.76385
published_at 2026-04-11T12:55:00Z
8
value 0.00949
scoring_system epss
scoring_elements 0.76363
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472666
reference_id 1472666
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472666
29
reference_url http://www.securityfocus.com/bid/99827
reference_id 99827
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url http://www.securityfocus.com/bid/99827
30
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url http://www.debian.org/security/2017/dsa-3954
31
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://security.gentoo.org/glsa/201709-22
32
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
33
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:1789
34
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:1790
35
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:1791
36
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:1792
37
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:2424
38
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:2469
39
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:2481
40
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:2530
41
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:17Z/
url https://access.redhat.com/errata/RHSA-2017:3453
42
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
43
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
aliases CVE-2017-10243
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5vrc-h4t3-uucb
6
url VCID-7d2e-14yp-pkhq
vulnerability_id VCID-7d2e-14yp-pkhq
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10116.json
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10116.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10116
reference_id
reference_type
scores
0
value 0.00937
scoring_system epss
scoring_elements 0.76125
published_at 2026-04-01T12:55:00Z
1
value 0.00937
scoring_system epss
scoring_elements 0.76162
published_at 2026-04-04T12:55:00Z
2
value 0.00937
scoring_system epss
scoring_elements 0.76129
published_at 2026-04-02T12:55:00Z
3
value 0.0165
scoring_system epss
scoring_elements 0.82043
published_at 2026-04-16T12:55:00Z
4
value 0.0165
scoring_system epss
scoring_elements 0.8197
published_at 2026-04-07T12:55:00Z
5
value 0.0165
scoring_system epss
scoring_elements 0.81997
published_at 2026-04-08T12:55:00Z
6
value 0.0165
scoring_system epss
scoring_elements 0.82005
published_at 2026-04-09T12:55:00Z
7
value 0.0165
scoring_system epss
scoring_elements 0.82024
published_at 2026-04-11T12:55:00Z
8
value 0.0165
scoring_system epss
scoring_elements 0.82013
published_at 2026-04-12T12:55:00Z
9
value 0.0165
scoring_system epss
scoring_elements 0.82007
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10116
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471738
reference_id 1471738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471738
29
reference_url http://www.securityfocus.com/bid/99734
reference_id 99734
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url http://www.securityfocus.com/bid/99734
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
45
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:25Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
aliases CVE-2017-10116
risk_score 3.8
exploitability 0.5
weighted_severity 7.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7d2e-14yp-pkhq
7
url VCID-8t17-88c7-xqcz
vulnerability_id VCID-8t17-88c7-xqcz
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10135.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10135.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10135
reference_id
reference_type
scores
0
value 0.00405
scoring_system epss
scoring_elements 0.60959
published_at 2026-04-02T12:55:00Z
1
value 0.00405
scoring_system epss
scoring_elements 0.60887
published_at 2026-04-01T12:55:00Z
2
value 0.00405
scoring_system epss
scoring_elements 0.60989
published_at 2026-04-04T12:55:00Z
3
value 0.00405
scoring_system epss
scoring_elements 0.60954
published_at 2026-04-07T12:55:00Z
4
value 0.00405
scoring_system epss
scoring_elements 0.61002
published_at 2026-04-08T12:55:00Z
5
value 0.00405
scoring_system epss
scoring_elements 0.61018
published_at 2026-04-09T12:55:00Z
6
value 0.00405
scoring_system epss
scoring_elements 0.61039
published_at 2026-04-11T12:55:00Z
7
value 0.00405
scoring_system epss
scoring_elements 0.61025
published_at 2026-04-12T12:55:00Z
8
value 0.00405
scoring_system epss
scoring_elements 0.61005
published_at 2026-04-13T12:55:00Z
9
value 0.00405
scoring_system epss
scoring_elements 0.61047
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10135
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:N/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471871
reference_id 1471871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471871
29
reference_url http://www.securityfocus.com/bid/99839
reference_id 99839
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url http://www.securityfocus.com/bid/99839
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
40
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
41
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:51:46Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
aliases CVE-2017-10135
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8t17-88c7-xqcz
8
url VCID-9yds-dpzg-4ba9
vulnerability_id VCID-9yds-dpzg-4ba9
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10102.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10102.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10102
reference_id
reference_type
scores
0
value 0.00673
scoring_system epss
scoring_elements 0.7143
published_at 2026-04-16T12:55:00Z
1
value 0.00673
scoring_system epss
scoring_elements 0.7134
published_at 2026-04-07T12:55:00Z
2
value 0.00673
scoring_system epss
scoring_elements 0.71348
published_at 2026-04-02T12:55:00Z
3
value 0.00673
scoring_system epss
scoring_elements 0.71366
published_at 2026-04-04T12:55:00Z
4
value 0.00673
scoring_system epss
scoring_elements 0.7138
published_at 2026-04-08T12:55:00Z
5
value 0.00673
scoring_system epss
scoring_elements 0.71393
published_at 2026-04-09T12:55:00Z
6
value 0.00673
scoring_system epss
scoring_elements 0.71417
published_at 2026-04-11T12:55:00Z
7
value 0.00673
scoring_system epss
scoring_elements 0.71401
published_at 2026-04-12T12:55:00Z
8
value 0.00673
scoring_system epss
scoring_elements 0.71384
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10102
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1472345
reference_id 1472345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1472345
29
reference_url http://www.securityfocus.com/bid/99712
reference_id 99712
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url http://www.securityfocus.com/bid/99712
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
45
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:36Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
aliases CVE-2017-10102
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9yds-dpzg-4ba9
9
url VCID-awrz-da8u-7ud2
vulnerability_id VCID-awrz-da8u-7ud2
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10096.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10096
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64534
published_at 2026-04-16T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471528
reference_id 1471528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471528
29
reference_url http://www.securityfocus.com/bid/99670
reference_id 99670
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url http://www.securityfocus.com/bid/99670
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:38Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
aliases CVE-2017-10096
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-awrz-da8u-7ud2
10
url VCID-bthw-frhn-wqf6
vulnerability_id VCID-bthw-frhn-wqf6
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10109.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10109.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10109
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.72052
published_at 2026-04-16T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71964
published_at 2026-04-01T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.71972
published_at 2026-04-02T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71991
published_at 2026-04-04T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71967
published_at 2026-04-07T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.72006
published_at 2026-04-08T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72018
published_at 2026-04-09T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72042
published_at 2026-04-11T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.72026
published_at 2026-04-12T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.72011
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10109
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471670
reference_id 1471670
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471670
29
reference_url http://www.securityfocus.com/bid/99847
reference_id 99847
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url http://www.securityfocus.com/bid/99847
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:49Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
aliases CVE-2017-10109
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bthw-frhn-wqf6
11
url VCID-d4gw-vgm6-qbf3
vulnerability_id VCID-d4gw-vgm6-qbf3
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10107.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10107.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10107
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.64534
published_at 2026-04-16T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10107
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471266
reference_id 1471266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471266
29
reference_url http://www.securityfocus.com/bid/99719
reference_id 99719
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url http://www.securityfocus.com/bid/99719
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:35Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
aliases CVE-2017-10107
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d4gw-vgm6-qbf3
12
url VCID-dtcg-vqnh-kugk
vulnerability_id VCID-dtcg-vqnh-kugk
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10115.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10115
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.66353
published_at 2026-04-11T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66344
published_at 2026-04-16T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66302
published_at 2026-04-04T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66272
published_at 2026-04-07T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.6632
published_at 2026-04-08T12:55:00Z
5
value 0.00508
scoring_system epss
scoring_elements 0.66333
published_at 2026-04-09T12:55:00Z
6
value 0.00508
scoring_system epss
scoring_elements 0.6634
published_at 2026-04-12T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66276
published_at 2026-04-02T12:55:00Z
8
value 0.00508
scoring_system epss
scoring_elements 0.66237
published_at 2026-04-01T12:55:00Z
9
value 0.00508
scoring_system epss
scoring_elements 0.66309
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10115
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url http://www.securitytracker.com/id/1038931
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471851
reference_id 1471851
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471851
28
reference_url http://www.securityfocus.com/bid/99774
reference_id 99774
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url http://www.securityfocus.com/bid/99774
29
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url http://www.debian.org/security/2017/dsa-3919
30
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url http://www.debian.org/security/2017/dsa-3954
31
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://security.gentoo.org/glsa/201709-22
32
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
33
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:1789
34
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:1790
35
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:1791
36
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:1792
37
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:2424
38
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:2469
39
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:2481
40
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:2530
41
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://access.redhat.com/errata/RHSA-2017:3453
42
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
43
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
44
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:48Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
aliases CVE-2017-10115
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dtcg-vqnh-kugk
13
url VCID-hxb8-qu7h-8bdu
vulnerability_id VCID-hxb8-qu7h-8bdu
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10087.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10087.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10087
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64534
published_at 2026-04-16T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10087
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471521
reference_id 1471521
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471521
29
reference_url http://www.securityfocus.com/bid/99703
reference_id 99703
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url http://www.securityfocus.com/bid/99703
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:47Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
aliases CVE-2017-10087
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxb8-qu7h-8bdu
14
url VCID-ps35-n8f5-uqcr
vulnerability_id VCID-ps35-n8f5-uqcr
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10108.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10108.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10108
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.71991
published_at 2026-04-04T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.72052
published_at 2026-04-16T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.72011
published_at 2026-04-13T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.72026
published_at 2026-04-12T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.72042
published_at 2026-04-11T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.71972
published_at 2026-04-02T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72018
published_at 2026-04-09T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72006
published_at 2026-04-08T12:55:00Z
8
value 0.007
scoring_system epss
scoring_elements 0.71964
published_at 2026-04-01T12:55:00Z
9
value 0.007
scoring_system epss
scoring_elements 0.71967
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10108
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471888
reference_id 1471888
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471888
29
reference_url http://www.securityfocus.com/bid/99846
reference_id 99846
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url http://www.securityfocus.com/bid/99846
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
45
reference_url https://cert.vde.com/en-us/advisories/vde-2017-002
reference_id vde-2017-002
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-04T15:36:50Z/
url https://cert.vde.com/en-us/advisories/vde-2017-002
fixed_packages
aliases CVE-2017-10108
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ps35-n8f5-uqcr
15
url VCID-qfam-11ye-tkd8
vulnerability_id VCID-qfam-11ye-tkd8
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10110.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10110.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10110
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64534
published_at 2026-04-16T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64417
published_at 2026-04-01T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64471
published_at 2026-04-02T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.64502
published_at 2026-04-04T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-07T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64509
published_at 2026-04-08T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64525
published_at 2026-04-09T12:55:00Z
7
value 0.00468
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-11T12:55:00Z
8
value 0.00468
scoring_system epss
scoring_elements 0.64528
published_at 2026-04-12T12:55:00Z
9
value 0.00468
scoring_system epss
scoring_elements 0.64501
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10110
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 10
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471523
reference_id 1471523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471523
29
reference_url http://www.securityfocus.com/bid/99643
reference_id 99643
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url http://www.securityfocus.com/bid/99643
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:34Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
aliases CVE-2017-10110
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qfam-11ye-tkd8
16
url VCID-vu44-899q-6kct
vulnerability_id VCID-vu44-899q-6kct
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10074.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10074
reference_id
reference_type
scores
0
value 0.01893
scoring_system epss
scoring_elements 0.83232
published_at 2026-04-16T12:55:00Z
1
value 0.01893
scoring_system epss
scoring_elements 0.83129
published_at 2026-04-01T12:55:00Z
2
value 0.01893
scoring_system epss
scoring_elements 0.83146
published_at 2026-04-02T12:55:00Z
3
value 0.01893
scoring_system epss
scoring_elements 0.83159
published_at 2026-04-04T12:55:00Z
4
value 0.01893
scoring_system epss
scoring_elements 0.83158
published_at 2026-04-07T12:55:00Z
5
value 0.01893
scoring_system epss
scoring_elements 0.83183
published_at 2026-04-08T12:55:00Z
6
value 0.01893
scoring_system epss
scoring_elements 0.8319
published_at 2026-04-09T12:55:00Z
7
value 0.01893
scoring_system epss
scoring_elements 0.83206
published_at 2026-04-11T12:55:00Z
8
value 0.01893
scoring_system epss
scoring_elements 0.832
published_at 2026-04-12T12:55:00Z
9
value 0.01893
scoring_system epss
scoring_elements 0.83196
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 8.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471534
reference_id 1471534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471534
29
reference_url http://www.securityfocus.com/bid/99731
reference_id 99731
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url http://www.securityfocus.com/bid/99731
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:50Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
40
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
aliases CVE-2017-10074
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vu44-899q-6kct
17
url VCID-wcc9-n2hm-87fx
vulnerability_id VCID-wcc9-n2hm-87fx
summary
Multiple vulnerabilities have been found in Oracle's JRE and JDK
    software suites, and IcedTea, the worst of which may allow execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10067.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10067.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-10067
reference_id
reference_type
scores
0
value 0.00866
scoring_system epss
scoring_elements 0.75159
published_at 2026-04-16T12:55:00Z
1
value 0.00866
scoring_system epss
scoring_elements 0.75078
published_at 2026-04-01T12:55:00Z
2
value 0.00866
scoring_system epss
scoring_elements 0.7508
published_at 2026-04-02T12:55:00Z
3
value 0.00866
scoring_system epss
scoring_elements 0.75109
published_at 2026-04-04T12:55:00Z
4
value 0.00866
scoring_system epss
scoring_elements 0.75086
published_at 2026-04-07T12:55:00Z
5
value 0.00866
scoring_system epss
scoring_elements 0.7512
published_at 2026-04-08T12:55:00Z
6
value 0.00866
scoring_system epss
scoring_elements 0.75132
published_at 2026-04-09T12:55:00Z
7
value 0.00866
scoring_system epss
scoring_elements 0.75155
published_at 2026-04-11T12:55:00Z
8
value 0.00866
scoring_system epss
scoring_elements 0.75133
published_at 2026-04-12T12:55:00Z
9
value 0.00866
scoring_system epss
scoring_elements 0.75121
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-10067
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
26
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:C/I:C/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
27
reference_url http://www.securitytracker.com/id/1038931
reference_id 1038931
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url http://www.securitytracker.com/id/1038931
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1471535
reference_id 1471535
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1471535
29
reference_url http://www.securityfocus.com/bid/99756
reference_id 99756
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url http://www.securityfocus.com/bid/99756
30
reference_url http://www.debian.org/security/2017/dsa-3919
reference_id dsa-3919
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url http://www.debian.org/security/2017/dsa-3919
31
reference_url http://www.debian.org/security/2017/dsa-3954
reference_id dsa-3954
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url http://www.debian.org/security/2017/dsa-3954
32
reference_url https://security.gentoo.org/glsa/201709-22
reference_id GLSA-201709-22
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://security.gentoo.org/glsa/201709-22
33
reference_url https://security.netapp.com/advisory/ntap-20170720-0001/
reference_id ntap-20170720-0001
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://security.netapp.com/advisory/ntap-20170720-0001/
34
reference_url https://access.redhat.com/errata/RHSA-2017:1789
reference_id RHSA-2017:1789
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:1789
35
reference_url https://access.redhat.com/errata/RHSA-2017:1790
reference_id RHSA-2017:1790
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:1790
36
reference_url https://access.redhat.com/errata/RHSA-2017:1791
reference_id RHSA-2017:1791
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:1791
37
reference_url https://access.redhat.com/errata/RHSA-2017:1792
reference_id RHSA-2017:1792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:1792
38
reference_url https://access.redhat.com/errata/RHSA-2017:2424
reference_id RHSA-2017:2424
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:2424
39
reference_url https://access.redhat.com/errata/RHSA-2017:2469
reference_id RHSA-2017:2469
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:2469
40
reference_url https://access.redhat.com/errata/RHSA-2017:2481
reference_id RHSA-2017:2481
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:2481
41
reference_url https://access.redhat.com/errata/RHSA-2017:2530
reference_id RHSA-2017:2530
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:2530
42
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:56Z/
url https://access.redhat.com/errata/RHSA-2017:3453
43
reference_url https://usn.ubuntu.com/3366-1/
reference_id USN-3366-1
reference_type
scores
url https://usn.ubuntu.com/3366-1/
44
reference_url https://usn.ubuntu.com/3396-1/
reference_id USN-3396-1
reference_type
scores
url https://usn.ubuntu.com/3396-1/
fixed_packages
aliases CVE-2017-10067
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcc9-n2hm-87fx
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.151-2.6.11.0%3Farch=el6_9