Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/113162?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/113162?format=api", "purl": "pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.121-1jpp.1?arch=el7_3", "type": "rpm", "namespace": "redhat", "name": "java-1.8.0-oracle", "version": "1:1.8.0.121-1jpp.1", "qualifiers": { "arch": "el7_3" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37024?format=api", "vulnerability_id": "VCID-6383-1rzy-9kcr", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59436", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59584", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59566", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59508", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59502", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59533", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413906", "reference_id": "1413906", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413906" }, { "reference_url": "http://www.securityfocus.com/bid/95509", "reference_id": "95509", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://www.securityfocus.com/bid/95509" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3252" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6383-1rzy-9kcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37011?format=api", "vulnerability_id": "VCID-6xgm-xhae-3bbv", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5549", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67116", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67106", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.6708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67147", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5549" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413923", "reference_id": "1413923", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413923" }, { "reference_url": "http://www.securityfocus.com/bid/95530", "reference_id": "95530", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://www.securityfocus.com/bid/95530" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5549" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xgm-xhae-3bbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37035?format=api", "vulnerability_id": "VCID-7ez7-vdry-wbep", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78307", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78282", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78275", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78236", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78268", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3289" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413562", "reference_id": "1413562", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413562" }, { "reference_url": "http://www.securityfocus.com/bid/95525", "reference_id": "95525", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://www.securityfocus.com/bid/95525" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3289" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ez7-vdry-wbep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37019?format=api", "vulnerability_id": "VCID-ar8p-z4ww-wuau", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98941", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98953", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98943", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98945", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98952", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.9895", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413955", "reference_id": "1413955", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413955" }, { "reference_url": "https://www.exploit-db.com/exploits/41145/", "reference_id": "41145", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://www.exploit-db.com/exploits/41145/" }, { "reference_url": "http://www.securityfocus.com/bid/95488", "reference_id": "95488", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://www.securityfocus.com/bid/95488" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py", "reference_id": "CVE-2017-3241", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/", "reference_id": "erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3241" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ar8p-z4ww-wuau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37009?format=api", "vulnerability_id": "VCID-c7sa-v6cu-d3ex", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.7939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79405", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79382", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79373", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79346", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.7933", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.7936", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413764", "reference_id": "1413764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413764" }, { "reference_url": "http://www.securityfocus.com/bid/95521", "reference_id": "95521", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://www.securityfocus.com/bid/95521" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5547" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c7sa-v6cu-d3ex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37008?format=api", "vulnerability_id": "VCID-e2zb-3859-qfe6", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78586", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78536", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78543", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78573", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78556", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78582", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78588", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78612", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78594", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413911", "reference_id": "1413911", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413911" }, { "reference_url": "http://www.securityfocus.com/bid/95506", "reference_id": "95506", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://www.securityfocus.com/bid/95506" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5546" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e2zb-3859-qfe6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37028?format=api", "vulnerability_id": "VCID-ftnn-eurn-wydw", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74937", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74981", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74991", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.75012", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.7499", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74977", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.7494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74968", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413653", "reference_id": "1413653", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413653" }, { "reference_url": "http://www.securityfocus.com/bid/95566", "reference_id": "95566", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://www.securityfocus.com/bid/95566" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3261" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnn-eurn-wydw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37015?format=api", "vulnerability_id": "VCID-k3pa-xdxn-ubbg", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69191", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69256", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69285", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.693", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69259", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69207", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69209", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69227", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413717", "reference_id": "1413717", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413717" }, { "reference_url": "http://www.securityfocus.com/bid/95563", "reference_id": "95563", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://www.securityfocus.com/bid/95563" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3231" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k3pa-xdxn-ubbg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37026?format=api", "vulnerability_id": "VCID-kzak-fju8-eqew", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3259", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64523", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64563", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64612", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64628", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64645", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64576", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3259" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414163", "reference_id": "1414163", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414163" }, { "reference_url": "http://www.securityfocus.com/bid/95570", "reference_id": "95570", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://www.securityfocus.com/bid/95570" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3259" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kzak-fju8-eqew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37012?format=api", "vulnerability_id": "VCID-qs1s-6yjm-jye5", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72038", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.71993", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.7202", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.71996", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72035", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72047", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.7207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72054", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "http://www.securitytracker.com/id/1037798", "reference_id": "1037798", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.securitytracker.com/id/1037798" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413882", "reference_id": "1413882", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413882" }, { "reference_url": "https://source.android.com/security/bulletin/2017-02-01.html", "reference_id": "2017-02-01.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://source.android.com/security/bulletin/2017-02-01.html" }, { "reference_url": "http://www.securityfocus.com/bid/95512", "reference_id": "95512", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.securityfocus.com/bid/95512" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5552" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs1s-6yjm-jye5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37010?format=api", "vulnerability_id": "VCID-snqh-ebq3-hubn", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67116", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67106", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.6708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67147", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413920", "reference_id": "1413920", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413920" }, { "reference_url": "http://www.securityfocus.com/bid/95559", "reference_id": "95559", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://www.securityfocus.com/bid/95559" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5548" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-snqh-ebq3-hubn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37032?format=api", "vulnerability_id": "VCID-tc8v-xrjj-hucq", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78307", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78282", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78275", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78236", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78268", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.9", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:M/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413554", "reference_id": "1413554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413554" }, { "reference_url": "http://www.securityfocus.com/bid/95533", "reference_id": "95533", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://www.securityfocus.com/bid/95533" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3272" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8v-xrjj-hucq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37013?format=api", "vulnerability_id": "VCID-upgw-aw1e-m7g6", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8328.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8328.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8328", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68224", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68162", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68202", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.6818", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68231", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68246", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68271", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68258", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00558", "scoring_system": "epss", "scoring_elements": "0.68185", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8328" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414164", "reference_id": "1414164", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414164" }, { "reference_url": "http://www.securityfocus.com/bid/95581", "reference_id": "95581", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/" } ], "url": "http://www.securityfocus.com/bid/95581" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:47Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" } ], "fixed_packages": [], "aliases": [ "CVE-2016-8328" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-upgw-aw1e-m7g6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37025?format=api", "vulnerability_id": "VCID-v64t-4c46-3bhj", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.8283", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82894", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82899", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82904", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82888", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82847", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82856", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.8286", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413583", "reference_id": "1413583", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413583" }, { "reference_url": "http://www.securityfocus.com/bid/95498", "reference_id": "95498", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://www.securityfocus.com/bid/95498" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3253" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v64t-4c46-3bhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37029?format=api", "vulnerability_id": "VCID-xwtx-qzfe-duac", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3262.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3262.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3262", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71126", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71166", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71117", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71144", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71119", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71161", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71173", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71197", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71183", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3262" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414162", "reference_id": "1414162", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414162" }, { "reference_url": "http://www.securityfocus.com/bid/95578", "reference_id": "95578", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/" } ], "url": "http://www.securityfocus.com/bid/95578" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:27Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3262" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xwtx-qzfe-duac" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.8.0-oracle@1:1.8.0.121-1jpp.1%3Farch=el7_3" }