Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/113170?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/113170?format=api", "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.1-1jpp.1?arch=el6_8", "type": "rpm", "namespace": "redhat", "name": "java-1.7.1-ibm", "version": "1:1.7.1.4.1-1jpp.1", "qualifiers": { "arch": "el6_8" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38597?format=api", "vulnerability_id": "VCID-1pew-7np4-vqfu", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5597.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5597.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5597", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01929", "scoring_system": "epss", "scoring_elements": "0.8342", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01929", "scoring_system": "epss", "scoring_elements": "0.83317", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01929", "scoring_system": "epss", "scoring_elements": "0.83331", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01929", "scoring_system": "epss", "scoring_elements": "0.83347", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01929", "scoring_system": "epss", "scoring_elements": "0.83346", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01929", "scoring_system": "epss", "scoring_elements": "0.8337", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01929", "scoring_system": "epss", "scoring_elements": "0.8338", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01929", "scoring_system": "epss", "scoring_elements": "0.83395", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01929", "scoring_system": "epss", "scoring_elements": "0.83389", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01929", "scoring_system": "epss", "scoring_elements": "0.83384", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037040", "reference_id": "1037040", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://www.securitytracker.com/id/1037040" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386103", "reference_id": "1386103", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386103" }, { "reference_url": "http://www.securityfocus.com/bid/93636", "reference_id": "93636", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://www.securityfocus.com/bid/93636" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3707", "reference_id": "dsa-3707", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://www.debian.org/security/2016/dsa-3707" }, { "reference_url": "https://security.gentoo.org/glsa/201611-04", "reference_id": "GLSA-201611-04", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "https://security.gentoo.org/glsa/201611-04" }, { "reference_url": "https://security.gentoo.org/glsa/201701-43", "reference_id": "GLSA-201701-43", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "https://security.gentoo.org/glsa/201701-43" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20161019-0001/", "reference_id": "ntap-20161019-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20161019-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2079", "reference_id": "RHSA-2016:2079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2079" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html", "reference_id": "RHSA-2016-2079.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2088", "reference_id": "RHSA-2016:2088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2088" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html", "reference_id": "RHSA-2016-2088.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2089", "reference_id": "RHSA-2016:2089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2089" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html", "reference_id": "RHSA-2016-2089.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2090", "reference_id": "RHSA-2016:2090", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2090" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html", "reference_id": "RHSA-2016-2090.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2136", "reference_id": "RHSA-2016:2136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2136" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html", "reference_id": "RHSA-2016-2136.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2137", "reference_id": "RHSA-2016:2137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2137" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html", "reference_id": "RHSA-2016-2137.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2138", "reference_id": "RHSA-2016:2138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2138" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html", "reference_id": "RHSA-2016-2138.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2658", "reference_id": "RHSA-2016:2658", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2658" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html", "reference_id": "RHSA-2016-2658.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2659", "reference_id": "RHSA-2016:2659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2659" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html", "reference_id": "RHSA-2016-2659.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0061", "reference_id": "RHSA-2017:0061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0061" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html", "reference_id": "RHSA-2017-0061.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3121-1/", "reference_id": "USN-3121-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3121-1/" }, { "reference_url": "https://usn.ubuntu.com/3130-1/", "reference_id": "USN-3130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3130-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3130-1", "reference_id": "USN-3130-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://www.ubuntu.com/usn/USN-3130-1" }, { "reference_url": "https://usn.ubuntu.com/3154-1/", "reference_id": "USN-3154-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3154-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3154-1", "reference_id": "USN-3154-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:05Z/" } ], "url": "http://www.ubuntu.com/usn/USN-3154-1" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5597" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1pew-7np4-vqfu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38577?format=api", "vulnerability_id": "VCID-2krr-m59b-77a7", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1504.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1587.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1587.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1588.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1588.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1589.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1589.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3598.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3598", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07073", "scoring_system": "epss", "scoring_elements": "0.91537", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07073", "scoring_system": "epss", "scoring_elements": "0.91469", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07073", "scoring_system": "epss", "scoring_elements": "0.91475", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07073", "scoring_system": "epss", "scoring_elements": "0.91482", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07073", "scoring_system": "epss", "scoring_elements": "0.9149", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07073", "scoring_system": "epss", "scoring_elements": "0.91503", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07073", "scoring_system": "epss", "scoring_elements": "0.91509", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07073", "scoring_system": "epss", "scoring_elements": "0.91515", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07073", "scoring_system": "epss", "scoring_elements": "0.91516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07073", "scoring_system": "epss", "scoring_elements": "0.91514", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20160721-0001/" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "reference_url": "http://www.securityfocus.com/bid/91787", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://www.securityfocus.com/bid/91787" }, { "reference_url": "http://www.securityfocus.com/bid/91918", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://www.securityfocus.com/bid/91918" }, { "reference_url": "http://www.securitytracker.com/id/1036365", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://www.securitytracker.com/id/1036365" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3043-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://www.ubuntu.com/usn/USN-3043-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3062-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "http://www.ubuntu.com/usn/USN-3062-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356971", "reference_id": "1356971", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1356971" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update91:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update91:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3598", "reference_id": "CVE-2016-3598", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "9.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3598" }, { "reference_url": "https://security.gentoo.org/glsa/201610-08", "reference_id": "GLSA-201610-08", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "https://security.gentoo.org/glsa/201610-08" }, { "reference_url": "https://security.gentoo.org/glsa/201701-43", "reference_id": "GLSA-201701-43", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "https://security.gentoo.org/glsa/201701-43" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1458", "reference_id": "RHSA-2016:1458", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2016:1458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475", "reference_id": "RHSA-2016:1475", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2016:1475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1504", "reference_id": "RHSA-2016:1504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1587", "reference_id": "RHSA-2016:1587", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1587" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1588", "reference_id": "RHSA-2016:1588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1589", "reference_id": "RHSA-2016:1589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:52:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3043-1/", "reference_id": "USN-3043-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3043-1/" }, { "reference_url": "https://usn.ubuntu.com/3062-1/", "reference_id": "USN-3062-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3062-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-3598" ], "risk_score": 4.3, "exploitability": "0.5", "weighted_severity": "8.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2krr-m59b-77a7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30942?format=api", "vulnerability_id": "VCID-2v3q-7u91-syh3", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3443.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3443.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3443", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87363", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87373", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87388", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87387", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87406", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87413", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87426", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87421", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87417", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03399", "scoring_system": "epss", "scoring_elements": "0.87431", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3443" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20160420-0001/" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.securityfocus.com/bid/86482", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://www.securityfocus.com/bid/86482" }, { "reference_url": "http://www.securitytracker.com/id/1035596", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://www.securitytracker.com/id/1035596" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-16-376", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-376" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328618", "reference_id": "1328618", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328618" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3443", "reference_id": "CVE-2016-3443", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3443" }, { "reference_url": "https://security.gentoo.org/glsa/201606-18", "reference_id": "GLSA-201606-18", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "https://security.gentoo.org/glsa/201606-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677", "reference_id": "RHSA-2016:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678", "reference_id": "RHSA-2016:0678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679", "reference_id": "RHSA-2016:0679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701", "reference_id": "RHSA-2016:0701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702", "reference_id": "RHSA-2016:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708", "reference_id": "RHSA-2016:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716", "reference_id": "RHSA-2016:0716", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0716" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039", "reference_id": "RHSA-2016:1039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430", "reference_id": "RHSA-2016:1430", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2016:1430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:29Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" } ], "fixed_packages": [], "aliases": [ "CVE-2016-3443" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2v3q-7u91-syh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85230?format=api", "vulnerability_id": "VCID-46bb-rmw3-47c5", "summary": "JDK: insecure deserialization in CORBA, incorrect CVE-2013-5456 fix", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0376.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0376.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0376", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01931", "scoring_system": "epss", "scoring_elements": "0.83426", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01931", "scoring_system": "epss", "scoring_elements": "0.83396", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01931", "scoring_system": "epss", "scoring_elements": "0.83391", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01931", "scoring_system": "epss", "scoring_elements": "0.83323", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01931", "scoring_system": "epss", "scoring_elements": "0.83338", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01931", "scoring_system": "epss", "scoring_elements": "0.83353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01931", "scoring_system": "epss", "scoring_elements": "0.83352", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01931", "scoring_system": "epss", "scoring_elements": "0.83377", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01931", "scoring_system": "epss", "scoring_elements": "0.83386", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01931", "scoring_system": "epss", "scoring_elements": "0.83401", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0376" }, { "reference_url": "http://seclists.org/fulldisclosure/2016/Apr/43", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2016/Apr/43" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IX90171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IX90171" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980826", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980826" }, { "reference_url": "http://www.security-explorations.com/materials/SE-2012-01-IBM-5.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.security-explorations.com/materials/SE-2012-01-IBM-5.pdf" }, { "reference_url": "http://www.securityfocus.com/archive/1/538066/100/100/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/538066/100/100/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/89192", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/89192" }, { "reference_url": "http://www.securitytracker.com/id/1035953", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035953" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330986", "reference_id": "1330986", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1330986" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "reference_id": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0376", "reference_id": "CVE-2016-0376", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0376" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701", "reference_id": "RHSA-2016:0701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702", "reference_id": "RHSA-2016:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708", "reference_id": "RHSA-2016:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716", "reference_id": "RHSA-2016:0716", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0716" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039", "reference_id": "RHSA-2016:1039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430", "reference_id": "RHSA-2016:1430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1216" } ], "fixed_packages": [], "aliases": [ "CVE-2016-0376" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-46bb-rmw3-47c5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85199?format=api", "vulnerability_id": "VCID-4ptw-ap8n-bkf2", "summary": "JDK: buffer overflow vulnerability in the IBM JVM", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0264.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0264.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0264", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12796", "scoring_system": "epss", "scoring_elements": "0.94032", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.12796", "scoring_system": "epss", "scoring_elements": "0.94012", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12796", "scoring_system": "epss", "scoring_elements": "0.94017", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12796", "scoring_system": "epss", "scoring_elements": "0.93978", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12796", "scoring_system": "epss", "scoring_elements": "0.93988", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12796", "scoring_system": "epss", "scoring_elements": "0.93996", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12796", "scoring_system": "epss", "scoring_elements": "0.93999", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12796", "scoring_system": "epss", "scoring_elements": "0.94008", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0264" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV84035", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV84035" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980826", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980826" }, { "reference_url": "http://www.securitytracker.com/id/1035953", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035953" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331359", "reference_id": "1331359", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331359" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "reference_id": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0264", "reference_id": "CVE-2016-0264", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "5.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0264" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701", "reference_id": "RHSA-2016:0701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702", "reference_id": "RHSA-2016:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708", "reference_id": "RHSA-2016:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716", "reference_id": "RHSA-2016:0716", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0716" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039", "reference_id": "RHSA-2016:1039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430", "reference_id": "RHSA-2016:1430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1216" } ], "fixed_packages": [], "aliases": [ "CVE-2016-0264" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ptw-ap8n-bkf2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37024?format=api", "vulnerability_id": "VCID-6383-1rzy-9kcr", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3252.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59436", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59533", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59502", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59566", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59584", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00381", "scoring_system": "epss", "scoring_elements": "0.59508", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413906", "reference_id": "1413906", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413906" }, { "reference_url": "http://www.securityfocus.com/bid/95509", "reference_id": "95509", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://www.securityfocus.com/bid/95509" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3252" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6383-1rzy-9kcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85268?format=api", "vulnerability_id": "VCID-6t46-7fea-dyav", "summary": "JDK: insecure use of invoke method in CORBA component, incorrect CVE-2013-3009 fix", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0363.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0363.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0363", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71686", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.7166", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71641", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71605", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71612", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.7163", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71602", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71642", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71653", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00684", "scoring_system": "epss", "scoring_elements": "0.71677", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0363" }, { "reference_url": "http://seclists.org/fulldisclosure/2016/Apr/20", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2016/Apr/20" }, { "reference_url": "http://seclists.org/fulldisclosure/2016/Apr/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2016/Apr/3" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IX90172", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IX90172" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980826", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980826" }, { "reference_url": "http://www.security-explorations.com/materials/SE-2012-01-IBM-4.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.security-explorations.com/materials/SE-2012-01-IBM-4.pdf" }, { "reference_url": "http://www.securityfocus.com/bid/85895", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/85895" }, { "reference_url": "http://www.securitytracker.com/id/1035953", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035953" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324044", "reference_id": "1324044", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1324044" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "reference_id": "cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java_sdk:*:*:*:*:technology:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_module_for_legacy_software:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp2:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_manager_proxy:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_openstack_cloud:5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_supplementary:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0363", "reference_id": "CVE-2016-0363", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0363" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701", "reference_id": "RHSA-2016:0701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702", "reference_id": "RHSA-2016:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708", "reference_id": "RHSA-2016:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716", "reference_id": "RHSA-2016:0716", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0716" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039", "reference_id": "RHSA-2016:1039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430", "reference_id": "RHSA-2016:1430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1216" } ], "fixed_packages": [], "aliases": [ "CVE-2016-0363" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6t46-7fea-dyav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37011?format=api", "vulnerability_id": "VCID-6xgm-xhae-3bbv", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5549.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5549", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67149", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67106", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.6708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67147", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67116", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67082", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5549" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413923", "reference_id": "1413923", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413923" }, { "reference_url": "http://www.securityfocus.com/bid/95530", "reference_id": "95530", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://www.securityfocus.com/bid/95530" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:29Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5549" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xgm-xhae-3bbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37035?format=api", "vulnerability_id": "VCID-7ez7-vdry-wbep", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3289.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78315", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78268", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78275", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78282", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78307", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78236", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3289" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413562", "reference_id": "1413562", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413562" }, { "reference_url": "http://www.securityfocus.com/bid/95525", "reference_id": "95525", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://www.securityfocus.com/bid/95525" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:06:05Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3289" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ez7-vdry-wbep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30937?format=api", "vulnerability_id": "VCID-8edn-xjyj-9fgf", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0687.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0687.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0687", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90161", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90104", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90115", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.9012", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90135", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90141", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.9015", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90149", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90101", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20160420-0001/" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3558", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://www.debian.org/security/2016/dsa-3558" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securityfocus.com/bid/86459", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://www.securityfocus.com/bid/86459" }, { "reference_url": "http://www.securitytracker.com/id/1035596", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://www.securitytracker.com/id/1035596" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2963-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2963-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2964-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2964-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2972-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2972-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327749", "reference_id": "1327749", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327749" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0687", "reference_id": "CVE-2016-0687", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0687" }, { "reference_url": "https://security.gentoo.org/glsa/201606-18", "reference_id": "GLSA-201606-18", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "https://security.gentoo.org/glsa/201606-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0650", "reference_id": "RHSA-2016:0650", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0650" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0651", "reference_id": "RHSA-2016:0651", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0651" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0675", "reference_id": "RHSA-2016:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0676", "reference_id": "RHSA-2016:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677", "reference_id": "RHSA-2016:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678", "reference_id": "RHSA-2016:0678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679", "reference_id": "RHSA-2016:0679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701", "reference_id": "RHSA-2016:0701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702", "reference_id": "RHSA-2016:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708", "reference_id": "RHSA-2016:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716", "reference_id": "RHSA-2016:0716", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0716" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0723", "reference_id": "RHSA-2016:0723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039", "reference_id": "RHSA-2016:1039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430", "reference_id": "RHSA-2016:1430", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2016:1430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/2963-1/", "reference_id": "USN-2963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2963-1/" }, { "reference_url": "https://usn.ubuntu.com/2964-1/", "reference_id": "USN-2964-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2964-1/" }, { "reference_url": "https://usn.ubuntu.com/2972-1/", "reference_id": "USN-2972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2972-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-0687" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8edn-xjyj-9fgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37019?format=api", "vulnerability_id": "VCID-ar8p-z4ww-wuau", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3241.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98941", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98955", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.9895", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98945", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98953", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98952", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.76808", "scoring_system": "epss", "scoring_elements": "0.98943", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413955", "reference_id": "1413955", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413955" }, { "reference_url": "https://www.exploit-db.com/exploits/41145/", "reference_id": "41145", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://www.exploit-db.com/exploits/41145/" }, { "reference_url": "http://www.securityfocus.com/bid/95488", "reference_id": "95488", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://www.securityfocus.com/bid/95488" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py", "reference_id": "CVE-2017-3241", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41145.py" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/", "reference_id": "erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:16Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3241" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ar8p-z4ww-wuau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38592?format=api", "vulnerability_id": "VCID-b15r-cqd5-rugd", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5554.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5554.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5554", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83786", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83752", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83756", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83746", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.8374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83716", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83686", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037040", "reference_id": "1037040", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://www.securitytracker.com/id/1037040" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385714", "reference_id": "1385714", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385714" }, { "reference_url": "http://www.securityfocus.com/bid/93637", "reference_id": "93637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://www.securityfocus.com/bid/93637" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3707", "reference_id": "dsa-3707", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://www.debian.org/security/2016/dsa-3707" }, { "reference_url": "https://security.gentoo.org/glsa/201611-04", "reference_id": "GLSA-201611-04", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "https://security.gentoo.org/glsa/201611-04" }, { "reference_url": "https://security.gentoo.org/glsa/201701-43", "reference_id": "GLSA-201701-43", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "https://security.gentoo.org/glsa/201701-43" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20161019-0001/", "reference_id": "ntap-20161019-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20161019-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2079", "reference_id": "RHSA-2016:2079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2079" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html", "reference_id": "RHSA-2016-2079.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2088", "reference_id": "RHSA-2016:2088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2088" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html", "reference_id": "RHSA-2016-2088.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2089", "reference_id": "RHSA-2016:2089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2089" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html", "reference_id": "RHSA-2016-2089.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2090", "reference_id": "RHSA-2016:2090", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2090" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html", "reference_id": "RHSA-2016-2090.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2136", "reference_id": "RHSA-2016:2136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2136" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html", "reference_id": "RHSA-2016-2136.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2137", "reference_id": "RHSA-2016:2137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2137" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html", "reference_id": "RHSA-2016-2137.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2138", "reference_id": "RHSA-2016:2138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2138" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html", "reference_id": "RHSA-2016-2138.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2658", "reference_id": "RHSA-2016:2658", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2658" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html", "reference_id": "RHSA-2016-2658.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2659", "reference_id": "RHSA-2016:2659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2659" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html", "reference_id": "RHSA-2016-2659.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0061", "reference_id": "RHSA-2017:0061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0061" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html", "reference_id": "RHSA-2017-0061.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3121-1/", "reference_id": "USN-3121-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3121-1/" }, { "reference_url": "https://usn.ubuntu.com/3130-1/", "reference_id": "USN-3130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3130-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3130-1", "reference_id": "USN-3130-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://www.ubuntu.com/usn/USN-3130-1" }, { "reference_url": "https://usn.ubuntu.com/3154-1/", "reference_id": "USN-3154-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3154-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3154-1", "reference_id": "USN-3154-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:26Z/" } ], "url": "http://www.ubuntu.com/usn/USN-3154-1" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5554" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b15r-cqd5-rugd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37009?format=api", "vulnerability_id": "VCID-c7sa-v6cu-d3ex", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79411", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.7936", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79346", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79373", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79382", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79405", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.7939", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.79378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01256", "scoring_system": "epss", "scoring_elements": "0.7933", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413764", "reference_id": "1413764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413764" }, { "reference_url": "http://www.securityfocus.com/bid/95521", "reference_id": "95521", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://www.securityfocus.com/bid/95521" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:40Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5547" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c7sa-v6cu-d3ex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30939?format=api", "vulnerability_id": "VCID-cmr5-b3n9-6uhu", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3422.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3422.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3422", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03713", "scoring_system": "epss", "scoring_elements": "0.8799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03713", "scoring_system": "epss", "scoring_elements": "0.87942", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03713", "scoring_system": "epss", "scoring_elements": "0.87945", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03713", "scoring_system": "epss", "scoring_elements": "0.87966", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03713", "scoring_system": "epss", "scoring_elements": "0.87973", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03713", "scoring_system": "epss", "scoring_elements": "0.87984", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03713", "scoring_system": "epss", "scoring_elements": "0.87976", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03713", "scoring_system": "epss", "scoring_elements": "0.87975", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03713", "scoring_system": "epss", "scoring_elements": "0.87918", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03713", "scoring_system": "epss", "scoring_elements": "0.87928", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3422" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20160420-0001/" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.securityfocus.com/bid/86488", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://www.securityfocus.com/bid/86488" }, { "reference_url": "http://www.securitytracker.com/id/1035596", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "http://www.securitytracker.com/id/1035596" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328620", "reference_id": "1328620", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328620" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3422", "reference_id": "CVE-2016-3422", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3422" }, { "reference_url": "https://security.gentoo.org/glsa/201606-18", "reference_id": "GLSA-201606-18", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "https://security.gentoo.org/glsa/201606-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677", "reference_id": "RHSA-2016:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678", "reference_id": "RHSA-2016:0678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679", "reference_id": "RHSA-2016:0679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701", "reference_id": "RHSA-2016:0701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702", "reference_id": "RHSA-2016:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708", "reference_id": "RHSA-2016:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716", "reference_id": "RHSA-2016:0716", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0716" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039", "reference_id": "RHSA-2016:1039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430", "reference_id": "RHSA-2016:1430", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2016:1430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:58Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" } ], "fixed_packages": [], "aliases": [ "CVE-2016-3422" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cmr5-b3n9-6uhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37008?format=api", "vulnerability_id": "VCID-e2zb-3859-qfe6", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5546.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78614", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78536", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78543", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78573", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78556", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78582", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78588", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78612", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78594", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0116", "scoring_system": "epss", "scoring_elements": "0.78586", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:C/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413911", "reference_id": "1413911", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413911" }, { "reference_url": "http://www.securityfocus.com/bid/95506", "reference_id": "95506", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://www.securityfocus.com/bid/95506" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:41Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5546" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e2zb-3859-qfe6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37028?format=api", "vulnerability_id": "VCID-ftnn-eurn-wydw", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3261.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.75017", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74937", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74968", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74977", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.7499", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.75012", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74991", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74981", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.7494", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413653", "reference_id": "1413653", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413653" }, { "reference_url": "http://www.securityfocus.com/bid/95566", "reference_id": "95566", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://www.securityfocus.com/bid/95566" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:07Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3261" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnn-eurn-wydw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30941?format=api", "vulnerability_id": "VCID-jccp-8k75-xkhn", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3427.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3427.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3427", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.94019", "scoring_system": "epss", "scoring_elements": "0.99896", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.94019", "scoring_system": "epss", "scoring_elements": "0.99898", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.94019", "scoring_system": "epss", "scoring_elements": "0.99897", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.94019", "scoring_system": "epss", "scoring_elements": "0.99895", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3427" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10159", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10159" }, { "reference_url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r5f48b16573a11fdf0b557cc3d1d71423ecde8ee771c29f32334fa948%40%3Cdev.cassandra.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/r5f48b16573a11fdf0b557cc3d1d71423ecde8ee771c29f32334fa948%40%3Cdev.cassandra.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rc3abf40b06c511d5693baf707d6444bf7745e6a1e343e6f530a12258%40%3Cuser.cassandra.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://lists.apache.org/thread.html/rc3abf40b06c511d5693baf707d6444bf7745e6a1e343e6f530a12258%40%3Cuser.cassandra.apache.org%3E" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20160420-0001/" }, { "reference_url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3427" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3558", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://www.debian.org/security/2016/dsa-3558" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2020/08/31/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2020/08/31/1" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securityfocus.com/bid/86421", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://www.securityfocus.com/bid/86421" }, { "reference_url": "http://www.securitytracker.com/id/1035596", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://www.securitytracker.com/id/1035596" }, { "reference_url": "http://www.securitytracker.com/id/1037331", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://www.securitytracker.com/id/1037331" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2963-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2963-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2964-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2964-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2972-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2972-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328210", "reference_id": "1328210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328210" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:cassandra:4.0.0:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*", "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*", "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_cloud_manager:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_report:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*", "reference_id": "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_module_for_legacy:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:manager_proxy:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:openstack_cloud:5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3427", "reference_id": "CVE-2016-3427", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3427" }, { "reference_url": "https://security.gentoo.org/glsa/201606-18", "reference_id": "GLSA-201606-18", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://security.gentoo.org/glsa/201606-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0650", "reference_id": "RHSA-2016:0650", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0650" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0651", "reference_id": "RHSA-2016:0651", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0651" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0675", "reference_id": "RHSA-2016:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0676", "reference_id": "RHSA-2016:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677", "reference_id": "RHSA-2016:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678", "reference_id": "RHSA-2016:0678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679", "reference_id": "RHSA-2016:0679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701", "reference_id": "RHSA-2016:0701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702", "reference_id": "RHSA-2016:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708", "reference_id": "RHSA-2016:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716", "reference_id": "RHSA-2016:0716", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0716" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0723", "reference_id": "RHSA-2016:0723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039", "reference_id": "RHSA-2016:1039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430", "reference_id": "RHSA-2016:1430", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2016:1430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-08T15:06:35Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/2963-1/", "reference_id": "USN-2963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2963-1/" }, { "reference_url": "https://usn.ubuntu.com/2964-1/", "reference_id": "USN-2964-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2964-1/" }, { "reference_url": "https://usn.ubuntu.com/2972-1/", "reference_id": "USN-2972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2972-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-3427" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jccp-8k75-xkhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37015?format=api", "vulnerability_id": "VCID-k3pa-xdxn-ubbg", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3231.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69295", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69191", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69227", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69209", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69259", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.693", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69285", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69256", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00593", "scoring_system": "epss", "scoring_elements": "0.69207", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413717", "reference_id": "1413717", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413717" }, { "reference_url": "http://www.securityfocus.com/bid/95563", "reference_id": "95563", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://www.securityfocus.com/bid/95563" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:40Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3231" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k3pa-xdxn-ubbg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37026?format=api", "vulnerability_id": "VCID-kzak-fju8-eqew", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3259.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3259", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.6464", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64605", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64563", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64612", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64628", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64645", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64576", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64523", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3259" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414163", "reference_id": "1414163", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414163" }, { "reference_url": "http://www.securityfocus.com/bid/95570", "reference_id": "95570", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://www.securityfocus.com/bid/95570" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:30:09Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3259" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kzak-fju8-eqew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38595?format=api", "vulnerability_id": "VCID-n1wv-bkbb-gugt", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5573.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5573.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5573", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0284", "scoring_system": "epss", "scoring_elements": "0.86217", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0284", "scoring_system": "epss", "scoring_elements": "0.86136", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0284", "scoring_system": "epss", "scoring_elements": "0.86147", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0284", "scoring_system": "epss", "scoring_elements": "0.86162", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0284", "scoring_system": "epss", "scoring_elements": "0.86181", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0284", "scoring_system": "epss", "scoring_elements": "0.86193", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0284", "scoring_system": "epss", "scoring_elements": "0.86207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0284", "scoring_system": "epss", "scoring_elements": "0.86205", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0284", "scoring_system": "epss", "scoring_elements": "0.86201", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037040", "reference_id": "1037040", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://www.securitytracker.com/id/1037040" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385544", "reference_id": "1385544", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385544" }, { "reference_url": "http://www.securityfocus.com/bid/93628", "reference_id": "93628", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://www.securityfocus.com/bid/93628" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3707", "reference_id": "dsa-3707", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://www.debian.org/security/2016/dsa-3707" }, { "reference_url": "https://security.gentoo.org/glsa/201611-04", "reference_id": "GLSA-201611-04", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "https://security.gentoo.org/glsa/201611-04" }, { "reference_url": "https://security.gentoo.org/glsa/201701-43", "reference_id": "GLSA-201701-43", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "https://security.gentoo.org/glsa/201701-43" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20161019-0001/", "reference_id": "ntap-20161019-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20161019-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2079", "reference_id": "RHSA-2016:2079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2079" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html", "reference_id": "RHSA-2016-2079.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2088", "reference_id": "RHSA-2016:2088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2088" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html", "reference_id": "RHSA-2016-2088.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2089", "reference_id": "RHSA-2016:2089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2089" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html", "reference_id": "RHSA-2016-2089.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2090", "reference_id": "RHSA-2016:2090", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2090" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html", "reference_id": "RHSA-2016-2090.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2136", "reference_id": "RHSA-2016:2136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2136" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html", "reference_id": "RHSA-2016-2136.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2137", "reference_id": "RHSA-2016:2137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2137" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html", "reference_id": "RHSA-2016-2137.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2138", "reference_id": "RHSA-2016:2138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2138" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html", "reference_id": "RHSA-2016-2138.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2658", "reference_id": "RHSA-2016:2658", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2658" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html", "reference_id": "RHSA-2016-2658.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2659", "reference_id": "RHSA-2016:2659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2659" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html", "reference_id": "RHSA-2016-2659.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0061", "reference_id": "RHSA-2017:0061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0061" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html", "reference_id": "RHSA-2017-0061.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3121-1/", "reference_id": "USN-3121-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3121-1/" }, { "reference_url": "https://usn.ubuntu.com/3130-1/", "reference_id": "USN-3130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3130-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3130-1", "reference_id": "USN-3130-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://www.ubuntu.com/usn/USN-3130-1" }, { "reference_url": "https://usn.ubuntu.com/3154-1/", "reference_id": "USN-3154-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3154-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3154-1", "reference_id": "USN-3154-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:42Z/" } ], "url": "http://www.ubuntu.com/usn/USN-3154-1" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5573" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n1wv-bkbb-gugt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48513?format=api", "vulnerability_id": "VCID-n3s6-1ba7-47g7", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites allowing remote attackers to remotely execute arbitrary\n code, obtain information, and cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5556.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5556.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5556", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05068", "scoring_system": "epss", "scoring_elements": "0.89806", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05068", "scoring_system": "epss", "scoring_elements": "0.8975", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05068", "scoring_system": "epss", "scoring_elements": "0.89767", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05068", "scoring_system": "epss", "scoring_elements": "0.89769", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05068", "scoring_system": "epss", "scoring_elements": "0.89787", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05068", "scoring_system": "epss", "scoring_elements": "0.89793", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05068", "scoring_system": "epss", "scoring_elements": "0.898", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05068", "scoring_system": "epss", "scoring_elements": "0.89798", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05068", "scoring_system": "epss", "scoring_elements": "0.89791", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05068", "scoring_system": "epss", "scoring_elements": "0.89753", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5556" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037040", "reference_id": "1037040", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/" } ], "url": "http://www.securitytracker.com/id/1037040" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386408", "reference_id": "1386408", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1386408" }, { "reference_url": "http://www.securityfocus.com/bid/93618", "reference_id": "93618", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/" } ], "url": "http://www.securityfocus.com/bid/93618" }, { "reference_url": "https://security.gentoo.org/glsa/201611-04", "reference_id": "GLSA-201611-04", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/" } ], "url": "https://security.gentoo.org/glsa/201611-04" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20161019-0001/", "reference_id": "ntap-20161019-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20161019-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2088", "reference_id": "RHSA-2016:2088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2088" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html", "reference_id": "RHSA-2016-2088.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2089", "reference_id": "RHSA-2016:2089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2089" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html", "reference_id": "RHSA-2016-2089.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2090", "reference_id": "RHSA-2016:2090", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2090" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html", "reference_id": "RHSA-2016-2090.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2136", "reference_id": "RHSA-2016:2136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2136" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html", "reference_id": "RHSA-2016-2136.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2137", "reference_id": "RHSA-2016:2137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2137" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html", "reference_id": "RHSA-2016-2137.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2138", "reference_id": "RHSA-2016:2138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2138" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html", "reference_id": "RHSA-2016-2138.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2659", "reference_id": "RHSA-2016:2659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2659" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html", "reference_id": "RHSA-2016-2659.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-10T17:46:53Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5556" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n3s6-1ba7-47g7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50864?format=api", "vulnerability_id": "VCID-qp1y-5scd-c7hy", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites allowing remote attackers to remotely execute arbitrary\n code, obtain information, and cause Denial of Service.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1587.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1587.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1588.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1588.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1589.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1589.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3511.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3511", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.2334", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23277", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23451", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23488", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23272", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23345", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23395", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23414", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23377", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23323", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3511" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20160721-0001/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20160721-0001/" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "reference_url": "http://www.securityfocus.com/bid/91787", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://www.securityfocus.com/bid/91787" }, { "reference_url": "http://www.securityfocus.com/bid/91990", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://www.securityfocus.com/bid/91990" }, { "reference_url": "http://www.securitytracker.com/id/1036365", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "http://www.securitytracker.com/id/1036365" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358168", "reference_id": "1358168", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358168" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update101:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update92:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update101:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update92:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3511", "reference_id": "CVE-2016-3511", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3511" }, { "reference_url": "https://security.gentoo.org/glsa/201610-08", "reference_id": "GLSA-201610-08", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "https://security.gentoo.org/glsa/201610-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1475", "reference_id": "RHSA-2016:1475", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2016:1475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1476", "reference_id": "RHSA-2016:1476", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2016:1476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1587", "reference_id": "RHSA-2016:1587", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1587" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1588", "reference_id": "RHSA-2016:1588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1589", "reference_id": "RHSA-2016:1589", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1589" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-11T19:53:20Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" } ], "fixed_packages": [], "aliases": [ "CVE-2016-3511" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "6.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qp1y-5scd-c7hy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37012?format=api", "vulnerability_id": "VCID-qs1s-6yjm-jye5", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5552.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72079", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.71993", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.7202", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.71996", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72035", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72047", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.7207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72054", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00702", "scoring_system": "epss", "scoring_elements": "0.72038", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "http://www.securitytracker.com/id/1037798", "reference_id": "1037798", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.securitytracker.com/id/1037798" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413882", "reference_id": "1413882", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413882" }, { "reference_url": "https://source.android.com/security/bulletin/2017-02-01.html", "reference_id": "2017-02-01.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://source.android.com/security/bulletin/2017-02-01.html" }, { "reference_url": "http://www.securityfocus.com/bid/95512", "reference_id": "95512", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.securityfocus.com/bid/95512" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:39Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5552" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs1s-6yjm-jye5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30943?format=api", "vulnerability_id": "VCID-qs56-bnkb-buhu", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3449.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3449.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3449", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0409", "scoring_system": "epss", "scoring_elements": "0.88523", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0409", "scoring_system": "epss", "scoring_elements": "0.88531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0409", "scoring_system": "epss", "scoring_elements": "0.88548", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0409", "scoring_system": "epss", "scoring_elements": "0.88552", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0409", "scoring_system": "epss", "scoring_elements": "0.8857", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0409", "scoring_system": "epss", "scoring_elements": "0.88575", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0409", "scoring_system": "epss", "scoring_elements": "0.88587", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0409", "scoring_system": "epss", "scoring_elements": "0.88579", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0409", "scoring_system": "epss", "scoring_elements": "0.88593", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3449" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20160420-0001/" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.securityfocus.com/bid/86485", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://www.securityfocus.com/bid/86485" }, { "reference_url": "http://www.securitytracker.com/id/1035596", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "http://www.securitytracker.com/id/1035596" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328619", "reference_id": "1328619", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328619" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3449", "reference_id": "CVE-2016-3449", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:C" }, { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3449" }, { "reference_url": "https://security.gentoo.org/glsa/201606-18", "reference_id": "GLSA-201606-18", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "https://security.gentoo.org/glsa/201606-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677", "reference_id": "RHSA-2016:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678", "reference_id": "RHSA-2016:0678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679", "reference_id": "RHSA-2016:0679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701", "reference_id": "RHSA-2016:0701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702", "reference_id": "RHSA-2016:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708", "reference_id": "RHSA-2016:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716", "reference_id": "RHSA-2016:0716", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0716" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039", "reference_id": "RHSA-2016:1039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430", "reference_id": "RHSA-2016:1430", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2016:1430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:28Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" } ], "fixed_packages": [], "aliases": [ "CVE-2016-3449" ], "risk_score": 3.8, "exploitability": "0.5", "weighted_severity": "7.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qs56-bnkb-buhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30936?format=api", "vulnerability_id": "VCID-r7cu-ewk5-pygd", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00009.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00012.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00022.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00027.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0675.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0676.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0678.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0679.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0723.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0686.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0686.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0686", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90161", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90104", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90115", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.9012", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90135", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90141", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.9015", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90149", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05413", "scoring_system": "epss", "scoring_elements": "0.90101", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20160420-0001/" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3558", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://www.debian.org/security/2016/dsa-3558" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securityfocus.com/bid/86473", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://www.securityfocus.com/bid/86473" }, { "reference_url": "http://www.securitytracker.com/id/1035596", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://www.securitytracker.com/id/1035596" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2963-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2963-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2964-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2964-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2972-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2972-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327743", "reference_id": "1327743", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327743" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update113:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update99:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update113:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update99:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0686", "reference_id": "CVE-2016-0686", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0686" }, { "reference_url": "https://security.gentoo.org/glsa/201606-18", "reference_id": "GLSA-201606-18", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "https://security.gentoo.org/glsa/201606-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0650", "reference_id": "RHSA-2016:0650", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0650" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0651", "reference_id": "RHSA-2016:0651", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0651" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0675", "reference_id": "RHSA-2016:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0676", "reference_id": "RHSA-2016:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677", "reference_id": "RHSA-2016:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0678", "reference_id": "RHSA-2016:0678", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0679", "reference_id": "RHSA-2016:0679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701", "reference_id": "RHSA-2016:0701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702", "reference_id": "RHSA-2016:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708", "reference_id": "RHSA-2016:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716", "reference_id": "RHSA-2016:0716", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0716" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0723", "reference_id": "RHSA-2016:0723", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0723" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039", "reference_id": "RHSA-2016:1039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430", "reference_id": "RHSA-2016:1430", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2016:1430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-15T18:55:41Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/2963-1/", "reference_id": "USN-2963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2963-1/" }, { "reference_url": "https://usn.ubuntu.com/2964-1/", "reference_id": "USN-2964-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2964-1/" }, { "reference_url": "https://usn.ubuntu.com/2972-1/", "reference_id": "USN-2972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2972-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-0686" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7cu-ewk5-pygd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37010?format=api", "vulnerability_id": "VCID-snqh-ebq3-hubn", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5548.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67149", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67044", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67106", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.6708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67147", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00527", "scoring_system": "epss", "scoring_elements": "0.67116", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413920", "reference_id": "1413920", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413920" }, { "reference_url": "http://www.securityfocus.com/bid/95559", "reference_id": "95559", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://www.securityfocus.com/bid/95559" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:31:32Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5548" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-snqh-ebq3-hubn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50861?format=api", "vulnerability_id": "VCID-taqg-ukr5-ybbk", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites allowing remote attackers to remotely execute arbitrary\n code, obtain information, and cause Denial of Service.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00026.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00039.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00058.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00059.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00061.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00067.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0650.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0651.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0677.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0701.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0702.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0708.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0716.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1039.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3426.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3426", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01595", "scoring_system": "epss", "scoring_elements": "0.81707", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01595", "scoring_system": "epss", "scoring_elements": "0.81617", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01595", "scoring_system": "epss", "scoring_elements": "0.81638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01595", "scoring_system": "epss", "scoring_elements": "0.81635", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01595", "scoring_system": "epss", "scoring_elements": "0.81663", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01595", "scoring_system": "epss", "scoring_elements": "0.81667", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01595", "scoring_system": "epss", "scoring_elements": "0.81688", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01595", "scoring_system": "epss", "scoring_elements": "0.81675", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01595", "scoring_system": "epss", "scoring_elements": "0.81668", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01595", "scoring_system": "epss", "scoring_elements": "0.81605", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3426" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20160420-0001/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20160420-0001/" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3558", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://www.debian.org/security/2016/dsa-3558" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "reference_url": "http://www.securityfocus.com/bid/86449", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://www.securityfocus.com/bid/86449" }, { "reference_url": "http://www.securitytracker.com/id/1035596", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://www.securitytracker.com/id/1035596" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2963-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328059", "reference_id": "1328059", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328059" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update77:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3426", "reference_id": "CVE-2016-3426", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3426" }, { "reference_url": "https://security.gentoo.org/glsa/201610-08", "reference_id": "GLSA-201610-08", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "https://security.gentoo.org/glsa/201610-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0650", "reference_id": "RHSA-2016:0650", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0650" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0651", "reference_id": "RHSA-2016:0651", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0651" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0677", "reference_id": "RHSA-2016:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0701", "reference_id": "RHSA-2016:0701", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0701" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0702", "reference_id": "RHSA-2016:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0708", "reference_id": "RHSA-2016:0708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0716", "reference_id": "RHSA-2016:0716", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0716" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1039", "reference_id": "RHSA-2016:1039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1430", "reference_id": "RHSA-2016:1430", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2016:1430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-15T18:57:54Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/2963-1/", "reference_id": "USN-2963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2963-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-3426" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-taqg-ukr5-ybbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37032?format=api", "vulnerability_id": "VCID-tc8v-xrjj-hucq", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3272.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78315", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78228", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78268", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7825", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78275", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78282", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78307", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.7829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01126", "scoring_system": "epss", "scoring_elements": "0.78236", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.9", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:M/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413554", "reference_id": "1413554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413554" }, { "reference_url": "http://www.securityfocus.com/bid/95533", "reference_id": "95533", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://www.securityfocus.com/bid/95533" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T19:27:09Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3272" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8v-xrjj-hucq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38589?format=api", "vulnerability_id": "VCID-u3rj-qyrr-vkbw", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5542.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5542.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5542", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83786", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83752", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83756", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83746", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.8374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83716", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02018", "scoring_system": "epss", "scoring_elements": "0.83686", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037040", "reference_id": "1037040", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://www.securitytracker.com/id/1037040" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385723", "reference_id": "1385723", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1385723" }, { "reference_url": "http://www.securityfocus.com/bid/93643", "reference_id": "93643", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://www.securityfocus.com/bid/93643" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3707", "reference_id": "dsa-3707", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://www.debian.org/security/2016/dsa-3707" }, { "reference_url": "https://security.gentoo.org/glsa/201611-04", "reference_id": "GLSA-201611-04", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "https://security.gentoo.org/glsa/201611-04" }, { "reference_url": "https://security.gentoo.org/glsa/201701-43", "reference_id": "GLSA-201701-43", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "https://security.gentoo.org/glsa/201701-43" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20161019-0001/", "reference_id": "ntap-20161019-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20161019-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2079", "reference_id": "RHSA-2016:2079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2079" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html", "reference_id": "RHSA-2016-2079.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2079.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2088", "reference_id": "RHSA-2016:2088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2088" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html", "reference_id": "RHSA-2016-2088.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2088.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2089", "reference_id": "RHSA-2016:2089", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2089" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html", "reference_id": "RHSA-2016-2089.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2089.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2090", "reference_id": "RHSA-2016:2090", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2090" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html", "reference_id": "RHSA-2016-2090.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2090.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2136", "reference_id": "RHSA-2016:2136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2136" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html", "reference_id": "RHSA-2016-2136.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2136.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2137", "reference_id": "RHSA-2016:2137", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2137" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html", "reference_id": "RHSA-2016-2137.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2137.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2138", "reference_id": "RHSA-2016:2138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2138" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html", "reference_id": "RHSA-2016-2138.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2138.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2658", "reference_id": "RHSA-2016:2658", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2658" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html", "reference_id": "RHSA-2016-2658.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2658.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:2659", "reference_id": "RHSA-2016:2659", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:2659" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html", "reference_id": "RHSA-2016-2659.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2659.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0061", "reference_id": "RHSA-2017:0061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0061" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html", "reference_id": "RHSA-2017-0061.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0061.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3121-1/", "reference_id": "USN-3121-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3121-1/" }, { "reference_url": "https://usn.ubuntu.com/3130-1/", "reference_id": "USN-3130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3130-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3130-1", "reference_id": "USN-3130-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://www.ubuntu.com/usn/USN-3130-1" }, { "reference_url": "https://usn.ubuntu.com/3154-1/", "reference_id": "USN-3154-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3154-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3154-1", "reference_id": "USN-3154-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-10T17:49:30Z/" } ], "url": "http://www.ubuntu.com/usn/USN-3154-1" } ], "fixed_packages": [], "aliases": [ "CVE-2016-5542" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u3rj-qyrr-vkbw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37025?format=api", "vulnerability_id": "VCID-v64t-4c46-3bhj", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3253.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82934", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.8283", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.8286", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82856", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82888", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82904", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82899", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82894", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01827", "scoring_system": "epss", "scoring_elements": "0.82847", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.securitytracker.com/id/1037637", "reference_id": "1037637", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://www.securitytracker.com/id/1037637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413583", "reference_id": "1413583", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1413583" }, { "reference_url": "http://www.securityfocus.com/bid/95498", "reference_id": "95498", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://www.securityfocus.com/bid/95498" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html", "reference_id": "cpujan2017-2881727.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3782", "reference_id": "dsa-3782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://www.debian.org/security/2017/dsa-3782" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20170119-0001/", "reference_id": "ntap-20170119-0001", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20170119-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0175", "reference_id": "RHSA-2017:0175", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0175" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html", "reference_id": "RHSA-2017-0175.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0175.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0176", "reference_id": "RHSA-2017:0176", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0176" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html", "reference_id": "RHSA-2017-0176.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0176.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0177", "reference_id": "RHSA-2017:0177", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0177" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html", "reference_id": "RHSA-2017-0177.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0177.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0180", "reference_id": "RHSA-2017:0180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0180" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html", "reference_id": "RHSA-2017-0180.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0180.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0263", "reference_id": "RHSA-2017:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0263" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html", "reference_id": "RHSA-2017-0263.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0263.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0269", "reference_id": "RHSA-2017:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0269" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html", "reference_id": "RHSA-2017-0269.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0269.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html", "reference_id": "RHSA-2017-0336.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0336.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html", "reference_id": "RHSA-2017-0337.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0337.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html", "reference_id": "RHSA-2017-0338.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0338.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-09T19:25:30Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-3253" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v64t-4c46-3bhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37005?format=api", "vulnerability_id": "VCID-x54g-mhs4-mug4", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites, the worst of which may allow execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2183", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97356", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97386", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97375", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97377", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97378", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97366", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.40993", "scoring_system": "epss", "scoring_elements": "0.97374", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2183" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383", "reference_id": "1369383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383" }, { "reference_url": "https://security.archlinux.org/ASA-201609-23", "reference_id": "ASA-201609-23", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201609-23" }, { "reference_url": "https://security.archlinux.org/ASA-201609-24", "reference_id": "ASA-201609-24", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201609-24" }, { "reference_url": "https://security.archlinux.org/AVG-29", "reference_id": "AVG-29", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-29" }, { "reference_url": "https://security.archlinux.org/AVG-30", "reference_id": "AVG-30", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-30" }, { "reference_url": "https://security.gentoo.org/glsa/201612-16", "reference_id": "GLSA-201612-16", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-16" }, { "reference_url": "https://security.gentoo.org/glsa/201701-65", "reference_id": "GLSA-201701-65", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-65" }, { "reference_url": "https://security.gentoo.org/glsa/201707-01", "reference_id": "GLSA-201707-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201707-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:1940", "reference_id": "RHSA-2016:1940", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:1940" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0336", "reference_id": "RHSA-2017:0336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0337", "reference_id": "RHSA-2017:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0338", "reference_id": "RHSA-2017:0338", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0338" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0462", "reference_id": "RHSA-2017:0462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1216", "reference_id": "RHSA-2017:1216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1216" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2708", "reference_id": "RHSA-2017:2708", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2708" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2709", "reference_id": "RHSA-2017:2709", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2709" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2710", "reference_id": "RHSA-2017:2710", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2710" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3239", "reference_id": "RHSA-2017:3239", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3239" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3240", "reference_id": "RHSA-2017:3240", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3240" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2123", "reference_id": "RHSA-2018:2123", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2123" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1245", "reference_id": "RHSA-2019:1245", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1245" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2859", "reference_id": "RHSA-2019:2859", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2859" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:0451", "reference_id": "RHSA-2020:0451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:0451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3842", "reference_id": "RHSA-2020:3842", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3842" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0308", "reference_id": "RHSA-2021:0308", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0308" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2438", "reference_id": "RHSA-2021:2438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2438" }, { "reference_url": "https://usn.ubuntu.com/3087-1/", "reference_id": "USN-3087-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3087-1/" }, { "reference_url": "https://usn.ubuntu.com/3179-1/", "reference_id": "USN-3179-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3179-1/" }, { "reference_url": "https://usn.ubuntu.com/3194-1/", "reference_id": "USN-3194-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3194-1/" }, { "reference_url": "https://usn.ubuntu.com/3198-1/", "reference_id": "USN-3198-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3198-1/" }, { "reference_url": "https://usn.ubuntu.com/3270-1/", "reference_id": "USN-3270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3270-1/" }, { "reference_url": "https://usn.ubuntu.com/3372-1/", "reference_id": "USN-3372-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3372-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2016-2183" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x54g-mhs4-mug4" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.4.1-1jpp.1%3Farch=el6_8" }