Lookup for vulnerable packages by Package URL.

GET /api/packages/113166?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/113166?format=api",
    "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.1-1jpp.2?arch=el7",
    "type": "rpm",
    "namespace": "redhat",
    "name": "java-1.7.1-ibm",
    "version": "1:1.7.1.4.1-1jpp.2",
    "qualifiers": {
        "arch": "el7"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37024?format=api",
            "vulnerability_id": "VCID-6383-1rzy-9kcr",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59436",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59549",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59568",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59584",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59566",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59553",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59508",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59502",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59533",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413906",
                    "reference_id": "1413906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413906"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95509",
                    "reference_id": "95509",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95509"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2017-3252"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6383-1rzy-9kcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37011?format=api",
            "vulnerability_id": "VCID-6xgm-xhae-3bbv",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67116",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67044",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67082",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67106",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67129",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67142",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67161",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67147",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5549"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413923",
                    "reference_id": "1413923",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413923"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95530",
                    "reference_id": "95530",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95530"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2016-5549"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xgm-xhae-3bbv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37035?format=api",
            "vulnerability_id": "VCID-7ez7-vdry-wbep",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78228",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78285",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78307",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78282",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78275",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78236",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7825",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78268",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413562",
                    "reference_id": "1413562",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413562"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95525",
                    "reference_id": "95525",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95525"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2017-3289"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ez7-vdry-wbep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37019?format=api",
            "vulnerability_id": "VCID-ar8p-z4ww-wuau",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98941",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98953",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98943",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98948",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98945",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98952",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.76808",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9895",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413955",
                    "reference_id": "1413955",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413955"
                },
                {
                    "reference_url": "https://www.exploit-db.com/exploits/41145/",
                    "reference_id": "41145",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://www.exploit-db.com/exploits/41145/"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95488",
                    "reference_id": "95488",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95488"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py",
                    "reference_id": "CVE-2017-3241",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/",
                    "reference_id": "erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2017-3241"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ar8p-z4ww-wuau"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37009?format=api",
            "vulnerability_id": "VCID-c7sa-v6cu-d3ex",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79337",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79378",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7939",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79405",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79382",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79373",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79346",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7933",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01256",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7936",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413764",
                    "reference_id": "1413764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413764"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95521",
                    "reference_id": "95521",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95521"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2016-5547"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c7sa-v6cu-d3ex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37008?format=api",
            "vulnerability_id": "VCID-e2zb-3859-qfe6",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78586",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78536",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78543",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78573",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78556",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78582",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78588",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78612",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78594",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413911",
                    "reference_id": "1413911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413911"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95506",
                    "reference_id": "95506",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95506"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2016-5546"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e2zb-3859-qfe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37028?format=api",
            "vulnerability_id": "VCID-ftnn-eurn-wydw",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74937",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74981",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74991",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75012",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7499",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74977",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74943",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74968",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413653",
                    "reference_id": "1413653",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413653"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95566",
                    "reference_id": "95566",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95566"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2017-3261"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnn-eurn-wydw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37015?format=api",
            "vulnerability_id": "VCID-k3pa-xdxn-ubbg",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69191",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69256",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69285",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.693",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69259",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69207",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69209",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00593",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69227",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413717",
                    "reference_id": "1413717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413717"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95563",
                    "reference_id": "95563",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95563"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2017-3231"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k3pa-xdxn-ubbg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37026?format=api",
            "vulnerability_id": "VCID-kzak-fju8-eqew",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3259",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64523",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64605",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64563",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64612",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64628",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64645",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64576",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3259"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414163",
                    "reference_id": "1414163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414163"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95570",
                    "reference_id": "95570",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95570"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2017-3259"
            ],
            "risk_score": 1.6,
            "exploitability": "0.5",
            "weighted_severity": "3.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kzak-fju8-eqew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37012?format=api",
            "vulnerability_id": "VCID-qs1s-6yjm-jye5",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72038",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71993",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7202",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71996",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72035",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72047",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7207",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00702",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72054",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037798",
                    "reference_id": "1037798",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037798"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413882",
                    "reference_id": "1413882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413882"
                },
                {
                    "reference_url": "https://source.android.com/security/bulletin/2017-02-01.html",
                    "reference_id": "2017-02-01.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://source.android.com/security/bulletin/2017-02-01.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95512",
                    "reference_id": "95512",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95512"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2016-5552"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs1s-6yjm-jye5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37010?format=api",
            "vulnerability_id": "VCID-snqh-ebq3-hubn",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67116",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67044",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67082",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67106",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6708",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67129",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67142",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67161",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00527",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67147",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413920",
                    "reference_id": "1413920",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413920"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95559",
                    "reference_id": "95559",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95559"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2016-5548"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "5.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-snqh-ebq3-hubn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37032?format=api",
            "vulnerability_id": "VCID-tc8v-xrjj-hucq",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78228",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78285",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78307",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78282",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78275",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78236",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7825",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01126",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78268",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:M/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413554",
                    "reference_id": "1413554",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413554"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95533",
                    "reference_id": "95533",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95533"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2017-3272"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8v-xrjj-hucq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37025?format=api",
            "vulnerability_id": "VCID-v64t-4c46-3bhj",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8283",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82894",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82899",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82904",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82888",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82881",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82847",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82856",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01827",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8286",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037637",
                    "reference_id": "1037637",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037637"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413583",
                    "reference_id": "1413583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413583"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95498",
                    "reference_id": "95498",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95498"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
                    "reference_id": "cpujan2017-2881727.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3782",
                    "reference_id": "dsa-3782",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://www.debian.org/security/2017/dsa-3782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/",
                    "reference_id": "ntap-20170119-0001",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20170119-0001/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175",
                    "reference_id": "RHSA-2017:0175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0175"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html",
                    "reference_id": "RHSA-2017-0175.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176",
                    "reference_id": "RHSA-2017:0176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0176"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html",
                    "reference_id": "RHSA-2017-0176.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177",
                    "reference_id": "RHSA-2017:0177",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0177"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html",
                    "reference_id": "RHSA-2017-0177.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180",
                    "reference_id": "RHSA-2017:0180",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0180"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html",
                    "reference_id": "RHSA-2017-0180.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263",
                    "reference_id": "RHSA-2017:0263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0263"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html",
                    "reference_id": "RHSA-2017-0263.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269",
                    "reference_id": "RHSA-2017:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0269"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html",
                    "reference_id": "RHSA-2017-0269.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html",
                    "reference_id": "RHSA-2017-0336.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html",
                    "reference_id": "RHSA-2017-0337.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html",
                    "reference_id": "RHSA-2017-0338.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2017-3253"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v64t-4c46-3bhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37005?format=api",
            "vulnerability_id": "VCID-x54g-mhs4-mug4",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2183",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97356",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97378",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97374",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97375",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97377",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97362",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97366",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.40993",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97367",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2183"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383",
                    "reference_id": "1369383",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201609-23",
                    "reference_id": "ASA-201609-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201609-23"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201609-24",
                    "reference_id": "ASA-201609-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201609-24"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-29",
                    "reference_id": "AVG-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-29"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-30",
                    "reference_id": "AVG-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201612-16",
                    "reference_id": "GLSA-201612-16",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201612-16"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-65",
                    "reference_id": "GLSA-201701-65",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201707-01",
                    "reference_id": "GLSA-201707-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201707-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1940",
                    "reference_id": "RHSA-2016:1940",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1940"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336",
                    "reference_id": "RHSA-2017:0336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0336"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337",
                    "reference_id": "RHSA-2017:0337",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0337"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338",
                    "reference_id": "RHSA-2017:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0462",
                    "reference_id": "RHSA-2017:0462",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0462"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216",
                    "reference_id": "RHSA-2017:1216",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:1216"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2708",
                    "reference_id": "RHSA-2017:2708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2708"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2709",
                    "reference_id": "RHSA-2017:2709",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2709"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2710",
                    "reference_id": "RHSA-2017:2710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2710"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3239",
                    "reference_id": "RHSA-2017:3239",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3239"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3240",
                    "reference_id": "RHSA-2017:3240",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3240"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2123",
                    "reference_id": "RHSA-2018:2123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1245",
                    "reference_id": "RHSA-2019:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:2859",
                    "reference_id": "RHSA-2019:2859",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:2859"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0451",
                    "reference_id": "RHSA-2020:0451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3842",
                    "reference_id": "RHSA-2020:3842",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3842"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0308",
                    "reference_id": "RHSA-2021:0308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0308"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2438",
                    "reference_id": "RHSA-2021:2438",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2438"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3087-1/",
                    "reference_id": "USN-3087-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3087-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3179-1/",
                    "reference_id": "USN-3179-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3179-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3194-1/",
                    "reference_id": "USN-3194-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3194-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3198-1/",
                    "reference_id": "USN-3198-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3198-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3270-1/",
                    "reference_id": "USN-3270-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3270-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3372-1/",
                    "reference_id": "USN-3372-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3372-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2016-2183"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x54g-mhs4-mug4"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.1-1jpp.2%3Farch=el7"
}